CISCO FLMESH HW KIT 1 Ultra Reliable Wireless Backhaul User Manual

June 1, 2024
Cisco

CISCO FLMESH HW KIT 1 Ultra-Reliable Wireless Backhaul

CISCO-FLMESH-HW-KIT-1-Ultra-Reliable-Wireless-Backhaul-
Product

Product Information

Specifications

  • Product Name: Cisco Ultra-Reliable Wireless Backhaul
  • CLI Version: Firmware version 1.2.6 (Edition 1.1)
  • Manufacturer: Cisco

Product Usage Instructions

Document Confidentiality
This user manual contains sensitive and proprietary information. Readers are bound by confidentiality restrictions imposed by Cisco Systems Inc. Unauthorized disclosure may violate non-disclosure agreements and may constitute a criminal offence.

Hazardous Condition Warnings
Only qualified personnel should use the command-line interface. Installations must comply with relevant legislation. In some countries, installation by a certified electrician may be required.

Frequently Asked Questions (FAQ)

  • Q: Can anyone use the command-line interface?
    A: Only suitably qualified personnel should use the CLI to ensure safe and proper operation.

  • Q: What should I do if I suspect unauthorized distribution of document content?
    A: Notify Cisco management immediately if you suspect any unauthorized distribution of document content to prevent potential legal issues.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word ‘partner’ does not imply a partnership relationship between Cisco and any other company. (1110R)

© 2018–2021 Cisco Systems, Inc. All rights reserved.

DOCUMENT CONFIDENTIALITY

  • This user manual contains information that is sensitive and proprietary to Cisco and/or its subsidiaries. By continuing to read this document, you give consent to be bound by the confidentiality restrictions imposed on it by Cisco Systems Inc. and agree that you will not disclose its contents to any unauthorized third parties.
  • Unauthorized disclosure and/or distribution of any information contained in this document may violate non-disclosure agreements (NDAs) to which you may be subject, and may also constitute a criminal offence under state and/or federal law.
  • If it comes to your attention that any part of this document has been subject to accidental or unauthorized distribution, or has otherwise been compromised, please notify the management of Cisco without delay.
  • Reproduction, distribution, utilization and/or communication of this document, or any part thereof without express authorization is strictly prohibited. Offenders will be held liable for payment of damages.
  • © 2018-2021 Cisco Systems Inc and/or its subsidiaries. All rights reserved.

HAZARDOUS CONDITION WARNINGS

Only suitably qualified personnel may use the command-line interface (CLI). All Cisco hardware and software installations must conform to all relevant legislation in the country of use. In some countries, legislation may require that hardware devices be installed only by a certified electrician. All Cisco products are designed with safety in mind. However, improper use of electronic devices and/or their control software has the potential to cause serious injury and/or property damage. To avoid such injury and damage, install, configure and operate Cisco products only if you are properly qualified to do so.

If any Cisco hardware unit breaks down or malfunctions, emits smoke or an unusual smell, if water or other foreign matter enters the unit enclosure, or if the unit is dropped onto a hard surface or damaged in any way, power off the unit immediately and contact an authorized Cisco dealer for assistance. If you are adjusting and/or controlling a Cisco device using control software such as the command-line interface or the device’s offline Configurator, do not make configuration changes unless you know with certainty that your changes will not negatively impact people or animals in the vicinity of the device and its antennas.

Radio-frequency transmission hazard

RADIO-FREQUENCY RADIATION

  • Non-ionizing radio frequency (RF) transmissions can be hazardous to human and animal health.
  • In sufficient quantity, RF radiation is capable of causing radiation burns, tissue damage and other injuries. Keep a safe distance from all RF-radiating devices such as antennas, when such devices are powered ON. Never stand in line with a powered RF-radiating device.
  • Before activating any device capable of transmitting RF signals, make sure that all persons and animals are protected from possible RF exposure.
  • Make sure that all RF feeds are securely connected to an appropriate antenna. Never activate any RF-capable device that is not connected to an antenna.

Optical radiation hazard

LASER RADIATION

  • If any Cisco hardware device is equipped with one or more SFP fibre-optic modules, it is classified as a Class 1 laser product. It may use laser-emitting components and/or very high-intensity light sources.
  • Do not look directly at the input/output end of the unit’s SFP connector, or the input/output end of any fiber-optic cable. Fibre-optic systems frequently use high-intensity light from laser or LED sources that may cause temporary or permanent blindness.
  • For additional guidance regarding the safe use of laser-based and LED-based fibre-optic technology, refer to ANSI Z136.2 (Safe Use of Optical Fiber Communication Systems Utilizing Laser Diode and LED Sources).

Hot surfaces hazard

  • HOT SURFACES
    The outer surfaces of some radio transceiver and gateway unit enclosures may become hot during normal operation. The outer enclosures of such devices are marked with the symbol seen above. During normal operation, do not touch or handle the unit enclosure without personal protective equipment.

REPORTING MISTAKES

You can help improve this document.
If you find any mistakes, or if you know of a way to improve the procedures that are given, please let us know by E-mailing your suggestions to the following addresses:

INTRODUCTION

This manual explains how to use the Cisco Command-line interface (CLI) as a means to configure and control Cisco hardware devices that are part of a network. The CLI is intended for use by wireless networking professionals who have been tasked with configuring Cisco gateway units and/or radio transceivers, and/or configuring and maintaining the system using Cisco software. Throughout this manual, configuration and adjustment settings are given for Cisco device parameters. You must have a thorough understanding of each parameter before attempting to configure or adjust it. Many configuration parameters are interdependent. Misconfiguration or poor adjustment of parameters could degrade the performance of a Cisco device, or make it inoperable.

IMPORTANT

  • The functions of all device configuration parameters are explained in detail in the Cisco RACER Configuration Manual and the user manual for your Cisco gateway device or radio transceiver device.
  • Be sure to read and understand the documents above before attempting to configure your device using the command-line interface.

This manual applies only to the following Cisco device firmware versions and their relevant hardware devices:

  • 1.2.6 (FM Ponte 50 radio transceiver kits)

This manual may contain commands and/or command parameters that are being newly introduced as part of a firmware version described in this manual, or that must be expressed in a way that is different to a previous version of the same command. All sub-sections containing new and/or modified commands are marked with:

NEW
This manual does not apply to device firmware versions that are more recent than the firmware versions above. For these firmware versions, refer to the appropriate version of the Cisco Command-line interface user manual.

CLI account types

  • Users can log onto the CLI using Administrator or View Mode credentials.
  • The differences between credential types are shown in the table below.
  • Account passwords can be changed by an Administrator, using RACER or the offline Configurator interface.
Account Default user name Default password Permissions
Administrator admin admin Full access, with read and write permissions.
View Mode user view mode Read permissions only. The user cannot change

configuration parameters.

If you are logging onto the device as an administrative user, log on using the following command:

  • ssh @

If you are logging onto the device in View Mode, log on using the following command:

  • ssh @

UNDERSTANDING THE CLI

  • The Cisco Networks command-line interface (CLI) is used to issue configuration commands to a Cisco device over a Secure Shell (SSH) service. SSH is a cryptographic network protocol that allows the secure operation of network services over an unsecured network.
  • The CLI can be regarded as a ‘backup’ user interface, giving an alternative method of configuring Cisco radio transceiver and gateway devices.
  • Like the RACER™ and on-board Configurator interfaces, the CLI allows you to inspect and modify the configuration parameters of the relevant unit.

TIP

  • The on-board Configurator interface features a limited set of configuration options for most Cisco devices.
  • To gain access to the full set of configuration options for the relevant Cisco device, use the RACER interface or command-line interface to configure the device.

USING THE CLI TO CONFIGURE CISCO DEVICES

IMPORTANT

  • Device configuration parameters can only be changed if you are accessing a device as an Administrator.
  • If you are accessing a device in View Mode, you can view the device’s configuration settings, but cannot change them.

To use the CLI to configure a Cisco device, do the steps below:

  1. Install an SSH client on the computer that you will use to configure the Cisco device. Recommended SSH clients include SecureCRT (Windows computers) and the built-in SSH terminal (Linux and Mac systems).
  2. Use the SSH client to log in to the Cisco device as an administrative user, substituting with the IP address of the Cisco unit. Do this by entering the following command using the terminal:
    • ssh @
  3. Use the SSH client to configure the Cisco device using the appropriate commands as given in this manual. Be sure to use the correct command-line syntax.
  4. Confirm the configuration changes by entering the following command:
    • write
  5. Reboot the unit by entering the following command:
    • reboot

UNDERSTANDING COMMAND-LINE SYNTAX

  • The logical structure of the configuration commands given using the CLI is referred to as syntax.
  • The configuration command syntax used by Cisco devices is simple. The command-line syntax can be used to issue one command or to issue multiple commands within a single command entry, before pressing the Enter key.
  • If multiple commands are made within a single command entry, all commands must be separated by spaces.
  • For demonstration, here are typical examples that show ways in which a radio transceiver’s Ethernet parameters can be configured.
  • To show the current configuration for a specific Ethernet port, you would enter the following command:
    • ethernet port eth 1

To configure the data transfer speed and duplex mode for a specific Ethernet port, you would make the needed choices based on:

  • The specifications are given in the network design document, and
  • The characteristics of the Cisco device.

As a typical example, an FM3500 Endo radio transceiver has the following features:

  • Two RJ-45 Ethernet ports, numbered 1 and 2.
  • A choice of two duplex modes (half and full).

Based on this information, if you wanted to set Ethernet port 2 of the FM3500 Endo to transmit and receive data in full duplex mode, you would enter the following command:

  • ethernet port eth 2 duplex full

CLI COMMANDS

Help content

Configuration objective CLI command Parameter options

Show context-sensitive help content for the current command. To be typed after the command name and command parameters.| **?**|

Manage the device status logs

Configuration objective CLI command Parameter options
View or clear the device status logs. status A Possible parameters for

A are:

·         show-logs (show the device status logs that have been created since the last clear command was executed.)

·         clear-logs (delete all existing device status logs.)

·           NEW delete-logs (deep-clean the repository containing all device status

logs.)

View the current network uptime duration

Configuration objective CLI command Parameter options
Show the amount of time for which the connected network has been operational.
**uptime**

View the device configuration that is currently running

Configuration objective CLI command Parameter options
Show a detailed view of the currently running device configuration. **show-
running- config**

Viewing and setting the device name

Configuration objective CLI command Parameter options
Show the device name that has been assigned to the device. **device
name**
Edit the device name that has previously been assigned to the device.
device name A Parameter A is the new device name.

Running an installed iperf server or client

Configuration objective CLI command Parameter options
Run the installed iperf server or client. **perf**
Specify iperf configuration options. **iperf B** Parameter B is the

specified iperf configuration option.

For a detailed list of perf

 |  | commands, refer to https://www.mankier.com/1/iperf.
---|---|---

Connecting to a remote host using SSH

Configuration objective CLI command Parameter options
Connect the device to a remote host using Secure Shell.

ssh C

| Parameter C is the hostname or IP address of the remote host.

Pinging the configured device

Configuration objective CLI command Parameter options
Send a ping from the hardware device to another, specified hardware device.
**ping A** Parameter A is the IP address of the hardware device that is

not the local device.

Set the ping count (in other words, to stop pinging after a specified number of packets).| **ping -c B**| Parameter B is the specified

number of echo request packets (optional).

Tracing the route from the device to its connected host

Configuration objective CLI command Parameter options

Return a description of the connected route from the local device, to its specified host (A).| traceroute A| Parameter A is the hostname of the specified host.
Specify the maximum number of hops included in the traceroute result.| **traceroute -m B**| Parameter B is the specified maximum number of hops. Note that the maximum number of hops cannot exceed

Wireless interface

IMPORTANT
If commands and values from this section are entered, they are validated by the installed software plug-ins and the regulatory mode to which the device has been set.

Configuration objective CLI command Parameter options
Show the active parameters of the wireless interface. **wireless**

Set the frequency, channel width and status parameters to

be changed at runtime, without having to reboot the device.

| **wireless life|
Set the device’s operating frequency.|  |
wireless frequency A**|  | Parameter A is the specified

frequency in MHz.

Set the device’s operating channel width.| wireless c width B| Parameter B is the specified channel width in MHz.

Depending on radio transceiver type, possible channel width values are 5, 10, 20, 40 or 80.

Enable and disable advanced encryption standard (AES) traffic encryption.| wireless crypto C| Possible parameters for C are enable and disable.
Set the device’s mesh network| **wireless passphrase| Parameter D is the network
passphrase.| ****
D| passphrase.
---|---|---
Set the device’s maximum transmission power output.|
Wireless TX power E**| Parameter E is the maximum transmission power level in dBm.

This parameter must be expressed as an unsigned integer between 0 and 36.

Alternatively, enable automatic transmission-power selection by entering wireless tx power AUTO. Note that AUTO must be entered in

capitals.

Enable and disable the device’s wireless interface.|  | wireless interface

G

|  | Possible parameters for G are

enable and disable.

Set the device’s transmission chain parameters.

|

Wireless TX chain H

| Possible parameters for H are first (transmission chain 1 only), second (transmission chain 2 only) or both.
Enable and disable Promiscuous Mode (backward compatibility with legacy Fluidmesh units).| wireless promise F| Possible parameters for F are enable (enable full backward compatibility) and disable (maintain compatibility with

newer devices only).

Set the device’s transmission chain parameters.| **wireless maximum H| Possible parameters for H are first (transmission chain 1 only), second (transmission chain 2 only) or both.
Enable and disable the reduction of false positive results during dynamic frequency selection (DFS) if the device is being operated in the UNII2 frequency band.|
wireless dfs [reduce-false- positives K]| Possible parameters for K are enable and disable.
Set the wireless multimedia (WMM) queue configuration string.|
wireless wmm N**| N is the WMM configuration string. This string takes the following form:

[bk|be|vi|vo] as A cumin B climax C top D and E

In the string above, [bk|be|vi|vo] represents the class-of-service (CoS) parameters.

·       bk is the CoS background queue parameter.

·       be is the CoS best-effort queue parameter.

·       vi is the CoS video queue parameter.

·       vo is the CoS voice queue parameter.

In the string above:

·       A is the arbitration inter-frame spacing value.

·       B is the minimum

 |  | transmission channel width value.

·       C is the maximum transmission channel width value.

·       D is the transmit opportunity value.

·       E is the aggregated MAC protocol data unit value.

---|---|---
Enable and disable noise floor calibration.| **wireless local J**| Possible parameters for J are

enable and disable.

Set the operational mode for dynamic frequency selection (DFS) when the device is operated in the UNII2 frequency band.| wireless radar-role U| Possible parameters for U are auto (The unit will automatically participate in a Principal/Subordinate role- election process, and the elected Principal unit will determine the operating frequency), master (All Subordinate units connected to the unit will match the unit’s DFS frequency selection) or slave (The unit will match the DFS frequency selection of the closest Principal unit).

Note that if value U is set to auto, all radio units that are part of the network must also be set to auto.

IMPORTANT

  • If a Cisco radio device is operated in the UNII2 frequency band, and the wireless radar role is set as master, the device will continuously monitor the chosen operating frequency for known radar patterns.
  • If the network detects a known radar pattern, the elected Principal (i.e. master) radio device coordinates a distributed frequency-switching procedure with all Subordinate (i.e. slave) radio units, allowing the network to continue operating on an alternate frequency without interruption.

Set the signal gain of the antenna connected to the wireless device.| wireless antenna- gain W| Parameter W is the maximum antenna gain in dBm.

This parameter must be expressed as an unsigned integer between 0 and 36.

Alternatively, reset antenna gain to the factory default level by entering wireless antenna gain UNSELECTED. Note that

UNSELECTED must be entered in capitals.

---|---|---
  NEW Specify the country in which the radio transceiver will be operated.| **wireless country W**| Parameter W is the identification string for the country in which the radio transceiver will be operated. Typical examples are UNITED STATES and ITALY. Note that

the country name must be entered in capitals.

IP address parameters

Configuration objective CLI command Parameter options
Show the device’s IP address parameters. IP
Set the device’s IP address. ip addr A Parameter A is the specified IP

address.
Set the device’s netmask parameter.| ip netmask B| Parameter B is the netmask.
Set the device’s IP gateway parameter.| ip gateway C| Parameter C is the IP gateway.
Set the device’s DNS1 address parameter.| ip dns1 D| Parameter D is the DNS1 address.
Set the device’s DNS2 address parameter.| ip dns2 E| Parameter E is the DNS2 address.

Administrative user password

IMPORTANT

  • Before changing the administrative user password, make sure that the password is known to all personnel who will use it.
  • If an administrative user password has been set, the system cannot recall it or display it for reference.
Configuration objective CLI command Parameter options

  NEW Set the Administrative user password for access to the device’s offline Configurator interface and CLI.| admin-user username Y passwd Z|

Parameter Y is the new administrator user name. Parameter Z is the new password.

View Mode user password

IMPORTANT

  • Before changing the View Mode user password, make sure that the password is known to all personnel who will use it.
  • When a password has been entered, the system cannot recall it or display it for reference.
Configuration objective CLI command Parameter options

  NEW   Set the View Mode user password for access to the device’s offline Configurator

interface and CLI.

|

view mode-user username F password G

| Parameter F is the new view-mode user name.

Parameter G is the new password.

Ethernet port parameters

Configuration objective CLI command Parameter options

  NEW Show the current configuration for a specific Ethernet port on the device.| **Ethernet port A**| Parameter A is the number of the Ethernet port being queried.

Possible values for A are eth 1 (LAN 1 port) or eth 2 (LAN 2 port).

  NEW Set the maximum port speed for the device’s Ethernet ports.| Ethernet port A speed B| Parameter A is the number of the Ethernet port (or SFP interface) whose speed is being modified. Possible values for A are eth 1 or eth 2.

Parameter B is the data transfer speed for the relevant port. Ethernet port speeds are expressed in Mbps. Possible values for B are 10, 100, or

auto.

  NEW Set the duplex mode for the device’s Ethernet ports.| Ethernet port A duplex C| Parameter A is the number of the Ethernet port for which the duplex mode is being set.

Parameter C is the port duplex mode. Possible values for C are half or full.

  NEW Change the size of the Ethernet maximum transmission unit (MTU) for the device ports.| ethernet mtu D| Parameter D is the port MTU size setting in bytes. The value can be set between a minimum of 1530 and a maximum of 1650 for FM1200V, FM3200,

FM4200 and 2000 for FM3500 and FM4500.

Hardware Reset button

Configuration objective CLI command Parameter options

Set the device’s hardware Reset button to trigger:

·       A unit reboot if the button is

| reset-button enable|
pressed for one second and released.

·       A factory reset if the button is pressed for 7 seconds and released.

|  |
---|---|---
Set the device’s hardware Reset button to trigger a factory reset if the button is pressed for 7 seconds and released (the unit reboot option will be unavailable).| reset-button factory|
Disable the hardware Reset button functionality.|  | reset-button disable|  |

Telnet functionality

Configuration objective CLI command Parameter options
Enable or disable the device’s Telnet capability. **telnet A**

Possible values for A are on or off.

Committing configuration settings to memory

IMPORTANT
After the write command is entered, you must reboot the device for the current configuration to take effect.

Configuration objective CLI command Parameter options
Commit the current configuration settings to memory. **write**

Rebooting the device

Configuration objective CLI command Parameter options
Reboot the device immediately. **reboot**

Discarding configuration changes made during the current session

Configuration objective CLI command Parameter options
Discard all configuration changes made during the current session.

**discard**

|

Resetting the unit to the factory default condition

Configuration objective CLI command Parameter options

Reset the unit to the factory default condition.

| factory YES

Note that YES must be typed in capitals.

|

Showing command-line history for the current session

Configuration objective CLI command Parameter options
Show a complete list of all CLI commands that have been **history**
entered during the current session.  
--- --- ---

Adding, removing and showing installed plug-in licenses

Configuration objective CLI command Parameter options

Show a complete list of the software plug-in licenses that are currently installed on the device.|

**plugins**

|
  NEW Add a new software plug-in license to the radio

transceiver.

|

plugins add B

| Value B is the activation code for the relevant plug-in license.
  NEW Delete a new software plug-in license from the radio

transceiver.

|

plugins remove C

| Value C is the name of the relevant plug-in license.

Showing the device model and firmware revision number

Configuration objective CLI command Parameter options
Show the device model and firmware revision number. **version**

Showing the device mesh ID number

Configuration objective CLI command Parameter options
Show the device’s Cisco mesh ID number. **meshed**

Show an engineering statistics summary

Configuration objective CLI command Parameter options

Show an instantaneous summary of current engineering statistics for the device.|

**eng-stats**

|
Show a summary of engineering statistics for the device that is updated once per

second.

|

**eng-stats refresh**

|

Network Time Protocol settings

Configuration objective CLI command Parameter options

Synchronize the device’s time settings with a chosen internet time server by activating

network time protocol (NTP).

|

**ntp Q**

|

Possible values for Q are

enable or disable.

Synchronize the device with a chosen primary NTP server.| **NTP server R| Value R is the URL of the chosen primary NTP server.
Synchronize the device with a chosen backup NTP server.| ****
ntp server2 S**| Value S is the URL of the chosen secondary NTP server.

Set the designated time zone in which the device is located.

|

**ntp timezone T**

| Value T is the local time zone.

Composite names must be bracketed with double quotation marks. A typical example might read “America/New York”.

Set the time and date immediately, instead of waiting| **to set**|

Virtual LAN settings

for the standard NTP setting period.|  |
---|---|---

IMPORTANT
If you are unfamiliar with virtual LAN (VLAN) networks and their management principles, refer to the Cisco VLAN specification document for detailed information.

Configuration objective CLI command Parameter options
Activate VLAN capability. **vlan status U** Possible values for U are

enable or disable.

Specify the management identification number of the VLAN (used to communicate with the device’s operating system).| **vlan mgm-vid V| Value V is the management VLAN identification number (integer != 0).
Specify the native identification number (the VLAN ID that is implicitly assigned to untagged packets received on trunk ports).|
vlan native-vid W**| Value W is the native VLAN identification number (integer).

Simple Network Management Protocol settings

Configuration objective CLI command Parameter options
Enable or disable SNMP functionality. snmp A Possible values for A are

enable or disable.

Specify the SNMP protocol version.| snmp version B| Possible values for A are v2c or

v3.

Specify the SNMP v2c community ID number (SNMP

v2c only).

|

snmp community-id C

| Value C is the SNMP v2c community ID number.
Specify the SNMP v3 user name (SNMP v3 only).| snmp username D| Value D is the SNMP v3 user name.
Specify the SNMP v3 user password (SNMP v3 only).| snmp password E| Value E is the SNMP v3 user password.
Specify the SNMP v3 authentication protocol (SNMP v3 only).|

snmp auth-method F

| Possible values for F are md5

or sha.

Specify the SNMP v3 encryption protocol (SNMP v3 only).|

snmp encryption G

| Possible values for G are des or aes. Alternatively, enter none if a v3 encryption protocol is not

needed.

Specify the SNMP v3 encryption passphrase (SNMP v3 only).|

snmp secret H

| Value H is the SNMP v3 encryption passphrase.
Specify the SNMP periodic trap settings.|  | snmp periodic-trap

I

|  | Possible values for Y are

enable or disable.

Specify the notification trap period for periodic SNMP traps.| snmp trap- period J| Value J is the notification trap period in minutes.
Enable or disable SNMP event traps.| snmp event-trap K| Possible values for Y are

enable or disable.

Specify the SNMP NMS hostname or IP address.| snmp NMS-hostname L| Value L is the hostname or IP address of the SNMP NMS.

Transport Layer Security settings

NOTE
Cisco hardware devices feature support for all versions of transport-layer security (TLS).

Configuration objective CLI command Parameter options
Show the versions of TLS that are supported by the device. **ts**
Restrict the device’s TLS support capability to TLS 1.2 only. **tls
1.2-only A** Possible values for A are enabled or disabled.

If the disabled command is executed, the device will support TLS 1.0, 1.1 and 1.2.

Device cloud-management settings

NOTE
For instructions on how to configure your Cisco device using the cloud-based RACER portal, refer to the Cisco RACER configuration manual.

Configuration objective CLI command Parameter options

Activate or deactivate Cisco Radio Configuration EnviRonment (RACER) configuration capability.| **racer B**| Possible values for B are:

·       online-cloud-managed (the device will take its configuration settings from the cloud-based RACER profile that is assigned to it.)

·       offline (the device is disconnected from RACER and must be manually configured using the CLI, or its offline Configurator

interface.)

MONITOR settings

NOTE
For instructions on how to do operational monitoring and gather statistics from your Cisco device using the MONITOR application, refer to the Cisco Radio Monitoring Dashboard Configuration Manual.

Configuration objective CLI command Parameter options

View the device’s current Cisco

Radio Monitoring Dashboard (MONITOR) connection status.

| monitor| Possible values for L are enable or disable.
Disconnect the device from MONITOR.

Note that the device can be re-connected to MONITOR at any

| monitor detach| Possible values for L are enable or disable.
time, using the MONITOR application.|  |
---|---|---

Link Layer Discovery Protocol settings

Configuration objective CLI command Parameter options
Activate LLDP capability. **lldp B** Possible values for B are

enable or disable.

Enable or disable the link layer discovery protocol-data SNMP

management information database.

| **lldp snmp-mib C| Possible values for C are enable or disable.
Show neighbouring devices that are also LLDP-enabled.| ****
lldp neighbours**|

Multicast settings
Note that as the FM Ponte 50 is configured to work in Bridge mode only, multicast capability can only be enabled or disabled.

Configuration objective CLI command Parameter options
  NEW Enable or disable multicast forwarding capability. **multicast
status D** Possible values for D are enable or disable.

Device firmware upgrade settings
These settings allow you to upgrade the firmware of the connected Cisco device using a trivial file transfer protocol (TFTP).

Configuration objective CLI command Parameter options

Specify the IP address of the TFTP server containing the needed firmware image.| tftp-fw-upgrade tftp-server D| Value D is the IP address of the TFTP server.
Specify the file name of the needed firmware image.|  | tftp-fw-upgrade

upgrade-fw-image E

|  | Value E is the file name of the needed firmware image.
Enable or disable automated firmware upgrades.|  | tftp-fw-upgrade automatic-upgrade

F

|  | Possible values for F are enable or disable.
Specify the periodic interval at which the device checks for the presence of a newer firmware upgrade package.| tftp-fw-upgrade check-period G| Value G is the automatic upgrade check period in hours.
Force an immediate check for a newer firmware upgrade package.| tftp-fw- upgrade check-now|

Enabling a CLI session time-out

Configuration objective CLI command Parameter options

  NEW Specify an ‘inactive’ period after which, if user activity is still not detected within the CLI console, the current user will automatically be logged out.| session-timeout O| Value O is the specified ‘inactive’ period in minutes after which the current user will automatically be logged out.

Possible values for O are:

·       1 to 35791 (i.e. a maximum inactive period of 596 hours.)

·       0 (time-out option disabled.)

Exit the command-line interface console

Configuration objective CLI command Parameter options
Exit the command-line interface console. **exit**

CLI COMMAND RESULTS

This section describes how to understand and interpret the feedback given by the Cisco command-line interface (CLI) under specific circumstances.

Interpreting # eng-stats output
The table below shows the CLI output for # eng-stats.

 | Kbps:| Total| Rx| Tx|
---|---|---|---|---|---
 | LAN:| 0| 0| 0|
 | WLAN:| 100| 72| 28|

Fluidity role: master vehicle ID 142186476

| static 5.0.147.3| mobile 5.0.41.57| sn| RSS| handoff| Tim| ac|
---|---|---|---|---|---|---|---
[00:F1:CA:80:93:03

]

| [00:F1:CA:80:29:39

]

| r

47

| i –

49

| 1486754405.00168097

9

| e 1| q

0

static 5.0.147.3| mobile 5.0.41.57|  | RSS|  |  |  | update
[00-F1-CA-80-93-

03]

| [00-F1-CA-80-29-

39]

| i

47

| d 11
static 5.0.88.123| mobile 5.0.41.57|  | RSS|  |  |  | update
[00-F1-CA-80-58-| [00-F1-CA-80-29-| i| d 11
7B]| 39]| 46|

WLAN Rx:

00:F1:CA:80:93:03| rate 162| mcs 12| mcs-

flags 1

| snr 45| rssi -51| received

433

| evm 21

26

---|---|---|---|---|---|---|---
00:F1:CA:80:58:7B| rate 54| mcs 0| mcs-

flags 0

| snr 46| rssi -50| received

115

| evm 0 0

WLAN Tx:

 | 00:F1:CA:80:93:03| rate

108

| mcs 5| mcs-

flags 1

| sent

1134

| failed

0

| retries

16

| LER 1%| PER

0%

|

The results shown in the table above are interpreted as follows:

Kbps: Total Rx Tx
LAN: 0 0 0
WLAN: 100 72 28

The section above shows the real-time transmission and receiving rates of the wireless and LAN interfaces.

  • Fluidity role: master vehicle ID 142186476

The section above shows the role of the Cisco device being interrogated. This example is a Principal (i.e. Master) vehicle unit, with unit ID number 142186476.

static 5.0.147.3| mobile 5.0.41.57| sn| RSS| handoff| Tim| ac|
---|---|---|---|---|---|---|---
[00:F1:CA:80:93:03

]

| [00:F1:CA:80:29:39

]

| r

47

| i –

49

| 1486754405.00168097

9

| e 1| q

0

static 5.0.147.3| mobile 5.0.41.57|  | RSS|  |  |  | update
[00-F1-CA-80-93-| [00-F1-CA-80-29-| i| d 11
03]| 39]| 47|
static 5.0.88.123| mobile 5.0.41.57|  | RSS|  |  |  | update
[00-F1-CA-80-58-| [00-F1-CA-80-29-| i| d 11
7B]| 39]| 46|

In the section above:

  • Radio unit 5.0.147.3 (first row) currently has access to radio coverage from two APs (which are also Cisco radio units).
  • The first line shows the access point (AP) to which the device being interrogated is currently connected to AP.
  • The second and third lines show other available APs and the status of those APs.
  • The information in the time 1 cell shows that a time of 1 ms was taken to create the new MPLS tunnel.
  • The information in the acq 0 cell shows a connection acquisition time of 0ms. In other words, the vehicle radio took 0ms to connect to the wireless infrastructure radio from outside the coverage zone.
  • The information in the handoff cell shows a timestamp at which the handoff occurred of 1486754405.001680979.
  • The information in the updated cell shows the timestamp at which the last control packet was received from the connected AP.

WLAN Rx:

00:F1:CA:80:93:03| rate 162| mcs 12| mcs-

flags 1

| snr 45| rssi -51| received

433

| evm 21

26

---|---|---|---|---|---|---|---
00:F1:CA:80:58:7B| rate 54| mcs 0| mcs-

flags 0

| snr 46| rssi -50| received

115

| evm 0 0

WLAN Tx:

00:F1:CA:80:93:03| rate 108| mcs 5| mcs- flags 1| sent 1134| failed 0| retries 16| LER 1%| PER 0%
---|---|---|---|---|---|---|---|---

The tables above show the physical status of the wireless TX (transmission) connection and RX (reception) connection:

  • rate shows the data transfer rate in Mbps.
  • SNR shows the signal-to-noise ratio.
  • RSSI shows the received signal strength in decibel-milliwatts.
  • LER shows the link error rate.
  • PER shows the packet error rate.
Ethernet 1 role: ingress/egress
Ethernet 2 role: Down

The table above shows the role of the radio unit’s Ethernet ports:

  • If a Down result is shown, the port is not connected.
  • If a mesh result is shown, the port allows only MPLS packets.
  • If an ingress/egress mesh result is shown, the port allows all types of data packets.

NOTICES AND COPYRIGHT

  • WARNING

    • Installation of Cisco hardware devices and their supporting infrastructure must be done by suitably qualified personnel only. In some countries, installation by a certified electrician may be required.
    • Cisco hardware installations must comply with all applicable local legislation.
  • WARNING
    To avoid danger from non-ionizing radiation and/or electric shock and/or high- intensity laser or LED light sources, be sure to install the unit only in a location with restricted access.

  • WARNING
    To avoid danger from electric shock, do not expose the unit to water or high humidity if the unit is powered ON, or if any access covers have been removed from the unit enclosure. Do not place liquid-filled objects on or above the unit.

NOTICES AND COPYRIGHT

NOTICE TO THE USER
Copyright © Cisco Systems Inc. All rights reserved. This manual and the software described herein shall not, in whole or in part, be reproduced, translated or reduced to any machine-readable form without the prior written consent of Cisco Systems Inc.

Cisco Systems Inc. provides no warranty about this manual, software or other information contained herein, and hereby expressly disclaims any implied warranties of merchantability or fitness for any particular purpose about this manual, the software or such other information. In no event shall Cisco Systems Inc. be held liable for any incidental, consequential or special damages, whether based on tort, contract or otherwise, arising out of or in connection with this manual, the software or other information contained herein, or use thereof. Cisco Systems Inc. reserves the right to make any modification to this manual or the information contained herein at any time, without notice. The software described herein may also be governed by the terms of a separate end-user license agreement.

Cisco is a registered trademark of Cisco Systems Inc.
MeshWizard, EasyMesh, FMQuadro, FluidThrottle, VOLO, Fluidity, Virtual Gig, ENDO and MOBI are trademarks of Cisco Systems Inc., Microsoft, Windows, Internet Explorer and Microsoft Edge are registered trademarks of the Microsoft Corporation in the United States and/or other countries.

Ethernet is a registered trademark of the Xerox Corporation.

  • Adobe and Flash Player are registered trademarks of Adobe Systems Incorporated in the United States and/or other countries.
  • All other brands and product names that appear in this document are trademarks or registered trademarks of their respective owners.

CISCO END-USER LICENSE AGREEMENT

Preamble

  • This License Agreement strictly prohibits you from using the Cisco Firmware on any device other than a Cisco Device. You are also prohibited from removing or modifying any Cisco copyright notice, trademark or user interface of the Cisco Firmware or any Cisco Device.
  • The Cisco Firmware is copyright-protected material under United States and international copyright and other applicable laws. Unauthorized copying, use or modification of any part of this firmware, or violation of the terms of this Agreement, will be prosecuted to the maximum extent allowable under law.

Notice
This is an agreement between you and Cisco Systems Inc (hereafter known as ‘Cisco’). You must read and agree to the terms of this firmware license agreement (hereafter known as the ‘Agreement’) before any Cisco firmware can be downloaded, installed or used. By clicking the ‘Accept’ button on any Cisco firmware download webpage, or by downloading, installing or using Cisco firmware and/or by using any Cisco device running Cisco firmware, you are agreeing to be bound by the terms and conditions of this agreement. If you do not agree with the terms and conditions of this agreement, then you should not download, install or use any Cisco firmware, and you agree to forego any implied or stated rights to download, install or use Cisco firmware.

Definitions

For this Agreement, the following terms shall have the following meanings:

‘Open Source Software’ means any software or software component, module or package that contains, or is derived in any manner (in whole or in part) from, any software that is distributed as free software, open source software or similar licensing or distribution models, including, without limitation, software licensed or distributed under any of the following licenses or distribution models, or licenses or distribution models similar to any of the following: (a) GNU’s General Public License (GPL) or Lesser/Library GPL (LGPL); (b) the Artistic License (e.g., PERL); (c) the Mozilla Public License; (d) the BSD License; and (e) the Apache License; ‘Cisco Device’ means a Cisco networking device that you
purchase or otherwise rightfully acquire; ‘Cisco Firmware’ means the firmware in object code form made available by Cisco for Cisco Devices; and ‘You’ and ‘Your’ mean the company, entity or individual who owns or otherwise rightfully acquires the Cisco Device into which the Cisco Firmware will be incorporated.

License Grant
Cisco grants you a non-exclusive, non-transferable license to use a copy of the Cisco Firmware and accompanying documentation and any updates or upgrades thereto provided by Cisco according to the terms set forth below. You are authorized by this license to use the Cisco Firmware in object code form only and solely in conjunction with applicable and permitted Cisco-branded products and/or services and by the applicable documentation. You are granted a limited and non-exclusive license (without the right to sublicense) to use the Software solely for the Cisco Devices that you own and control, and solely for use in conjunction with the Cisco Firmware.

Uses and restrictions on use

You may:
download and use Cisco Firmware for use in Cisco Devices, and make copies of the Cisco Firmware as reasonably necessary for such use, provided that you reproduce, unaltered, all proprietary notices that exist on or in the copies.

You may not, and shall not permit others to:

  • use the Cisco Firmware on any devices or products that are not owned by you or your business organization;
  • use the Cisco Firmware on any non-Cisco Devices;
  • copy the Cisco Firmware (except as expressly permitted above), or copy the accompanying documentation;
  • modify, translate, reverse engineer, decompile, disassemble or otherwise attempt (i) to defeat, avoid, bypass, remove, deactivate, or otherwise circumvent any software protection mechanisms in the Cisco Firmware, including without limitation any such mechanism used to restrict or control the functionality of the Cisco Firmware, or (ii) to derive the source code or the underlying ideas, algorithms, structure or organization from the Cisco Firmware (except that the foregoing limitation does not apply to the extent that such activities may not be prohibited under applicable law); or
  • distribute, rent, transfer or grant any rights in the Cisco Firmware or modifications thereof or accompanying documentation in any form to any person without the prior written consent of Cisco. (f) Remove any Cisco copyright notice or
  • Cisco branding from the Cisco Firmware or modify any user interface of the Cisco Firmware or Cisco Device.
  • Cisco Devices must be properly installed and they are sold for installation by a professional installer only. Cisco Devices must be installed by a professional installer of wireless networking products certified by Cisco and they are not designed for installation by the general public. It is your responsibility to follow local country regulations including operation within legal frequency channels, output power, and Dynamic Frequency Selection (DFS) requirements. You are responsible for keeping the devices working according to these rules.
  • The Cisco Firmware contains technological protection or other security features designed to prevent unauthorized use of the Cisco Firmware, including features to protect against the use of the Cisco Firmware beyond the scope of the license granted herein or in a manner prohibited herein. You agree that you shall not, and shall not attempt to, remove, disable, circumvent or otherwise create or implement any workaround to, any such copy protection or security features.
  • This license is not a sale. Title and copyrights to the Cisco Firmware, and any copy made by you, remain with Cisco and its suppliers. Unauthorized copying of the Cisco Firmware or the accompanying documentation, or failure to comply with the above restrictions, will result in the automatic termination of this license and will make other legal remedies available to Cisco.

Open-source software

You hereby acknowledge that the Cisco Firmware may contain Open Source Software. You agree to review any documentation that accompanies the Cisco Firmware or is identified in the documentation for the Cisco Firmware to determine which portions of the Cisco Firmware are Open Source Software and are licensed under an Open Source Software license. To the extent that any such license requires that Cisco provides you with rights to copy, modify, distribute or otherwise use any Open Source Software that is inconsistent with the limited rights granted to you in this Agreement, then such rights in the applicable Open Source Software license shall take precedence over the rights and restrictions granted in this Agreement, but solely concerning such Open Source Software. You acknowledge that the Open Source Software license is solely between you and the applicable licensor of the Open Source Software. You shall comply with the terms of all applicable Open Source Software licenses, if any. Copyrights to the Open Source Software are held by the copyright holders indicated in the copyright notices in the corresponding source files or as disclosed at www.cisco.com.

Termination
This license will continue until terminated. Unauthorized copying of the Cisco Firmware or failure to comply with the above restrictions will result in automatic termination of this Agreement and will make other legal remedies available to Cisco. This license will also automatically terminate if you go into liquidation, suffer or make any winding-up petition, make an arrangement with your creditors, or suffer or file any similar action in any jurisdiction in consequence of debt. Furthermore, Cisco may immediately terminate this Agreement if (I) you fail to cure a breach of this Agreement (other than a breach under Cisco intellectual property rights) within thirty (30) calendar days after its receipt of written notice regarding such breach, or (ii) you breach any Cisco intellectual property right. Upon termination of this license for any reason, you agree to destroy all copies of the Cisco Firmware. Any use of the Cisco Firmware after termination is unlawful.

Feedback
You may provide suggestions, comments or other feedback (‘Feedback’) concerning Cisco Firmware, and Cisco Devices. Feedback, even if designated as confidential by you, shall not impose any confidentiality obligations on Cisco. You agree that Cisco is free to use, disclose, reproduce, license or otherwise distribute and exploit any Feedback provided by you as Cisco sees fit, entirely without obligation or restriction of any kind on account of intellectual property rights, or otherwise.

Consent to use of data
You acknowledge and agree that Cisco may, directly or indirectly through the services of third parties, collect and store information regarding the use and performance of the Cisco Firmware and Cisco Devices, and about equipment through which it otherwise is accessed and used. You further agree that Cisco may use such information for any purpose related to any use of the Cisco Firmware and Cisco Devices by you, including, without limitation, improving the performance of the Cisco Firmware or developing updates and verifying your compliance with the terms of this Agreement and enforcing Cisco’s rights, including all intellectual property rights in and to the Cisco Firmware.

Cisco shall have the right to collect and analyze data and other information relating to the provision, use and performance of various aspects of the Cisco Firmware and Cisco Devices and related systems and technologies (‘Data’), and you give Cisco the right to use and disclose such Data (during and after the term of this Agreement) by Cisco’s Privacy Policy. If you choose to allow diagnostic and usage collection, you agree that Cisco and its subsidiaries and agents may collect, maintain, process and use diagnostic, technical, usage and related information, including but not limited to unique system or hardware identifiers, information about your device, system and software, that is gathered periodically to provide and improve Cisco’s products and services, facilitate the provision of software updates, product support and other services to you (if any) related to Cisco products, and to verify compliance with the terms of this license. Cisco may use this information, as long as it is collected in a form that does not personally identify you, for the purposes described above.

To enable Cisco’s partners and third-party developers to improve their software, hardware and services designed for use with Cisco products, Cisco may also provide any such partner or third-party developer with a subset of diagnostic information that is relevant to that partner’s or developer’s software, hardware and/or services, as long as the diagnostic information is in a form that does not personally identify you.

Warranty Disclaimer
Cisco Firmware, including without limitation any open source software, any Cisco Device, and any accompanying documentation are provided ‘As is’, and Cisco and its suppliers make, and you receive, no warranties or conditions, whether express, implied, statutory or otherwise, or in any communication with you, and Cisco and its suppliers specifically disclaim any implied warranty of merchantability, satisfactory quality, fitness for a particular purpose, or non-infringement and their equivalents. Cisco does not warrant that the operation of the Cisco Firmware will be uninterrupted or error-free or that the Cisco Firmware will meet your specific requirements. You acknowledge that Cisco has no support or maintenance obligations for the Cisco Firmware.

Limitation of liability

  • Except to the extent that liability may not by law be limited or excluded, in no event will Cisco or its suppliers be liable for loss of, or corruption to data, lost profits or loss of contracts, cost of procurement of substitute products or other special, incidental, punitive, consequential or indirect damages arising from the supply or use of the Cisco Firmware, howsoever caused and on any theory of liability (including without limitation negligence).
  • This limitation will apply even if Cisco or an authorized distributor or an authorized reseller has been advised of the possibility of such damages and notwithstanding the failure of the essential purpose of any limited remedy. In no event shall Cisco’s or its suppliers or its resellers’ liability exceed five hundred United States dollars (US$500). You acknowledge that this provision reflects a reasonable allocation of risk.

Exclusion of liability for emergency services

  • Cisco does not support, nor are the services intended to support or carry, emergency calls to any emergency services, including but not limited to 911 dialling.
  • Cisco will not be held responsible for any liability or any losses, and you, on behalf of yourself and all persons using the services through the licensed products, hereby waive any such claims or causes of action for losses arising from, or relating to, any party’s attempts to contact emergency service providers using the licensed products, including but not limited to calls to public safety answering points.
  • Cisco will not be held liable for any losses, whether in contract, warranty, tort (including negligence), or any other form of liability, for any claim, damage, or loss, (and you hereby waive any such claims or causes of action), arising from or relating to your (i) inability to use the services to contact emergency services, or (ii) failure to make additional arrangements to access emergency services.
  • The parties expressly acknowledge and agree that Cisco has set its prices and entered into this agreement in reliance upon the limitations of liability and disclaimers of warranties specified herein, which allocate the risk between Cisco and the end user and form a basis of the bargain between the parties.

Export control
You acknowledge that the Cisco Devices, Cisco Firmware, documents, technical data, and any other materials delivered under this Agreement are subject to U.S. export control laws, and may also be subject to export or import regulations in other countries. You agree to comply strictly with these laws and regulations and acknowledge that you have the responsibility to obtain any licenses to export, re-export, or import as may be required after delivery to you. You shall not, directly or indirectly, export, re-export or release the Cisco Devices and Cisco Firmware, to, or make the Cisco Devices and Cisco Firmware accessible from any jurisdiction or country to which export, reexport or release is prohibited by law, rule or regulation. In particular, but without limitation, the Cisco Devices and Cisco Firmware may not be exported or re-exported (a) into any U.S. embargoed countries or (b) to anyone on the U.S. Treasury Department’s list of Specially Designated Nationals or the U.S. Department of Commerce Denied Person’s List or Entity List.

By using the Cisco Devices and Cisco Firmware, you represent and warrant that you are not located in any such country or on any such list. You acknowledge and agree that you shall strictly comply with all applicable laws, regulations and rules, and complete all required undertakings (including obtaining any necessary export license or other governmental approval), before operating the Cisco Devices and Cisco Firmware, or exporting, re-exporting, releasing or otherwise making the Cisco Devices and Cisco Firmware available outside the U.S. You acknowledge and agree that Cisco has no further responsibility after the initial delivery to you, and you hereby agree to indemnify and hold Cisco harmless from and against all claim, loss, liability or damage suffered or incurred by Cisco resulting from, or related to your failure to comply with all export or import regulations.

General
This Agreement shall not be governed by the 1980 U.N. Convention on Contracts for the International Sale of Goods. Rather, this Agreement shall be governed by the laws of the State of Illinois, including its Uniform Commercial Code, without reference to conflicts of laws principles. You agree to the exclusive jurisdiction and venue of the State and Federal courts in Illinois, United States.

This Agreement is the entire agreement between you and Cisco and supersedes any other communications or advertising concerning the Cisco Firmware and accompanying documentation. If any provision of this Agreement is held invalid or unenforceable, such provision shall be revised to the extent necessary to cure the invalidity or unenforceability, and the remainder of the Agreement shall continue in full force and effect. This Agreement and all documents, notices, evidence, reports, opinions and other documents given or to be given under this Agreement (collectively with this Agreement, ‘Documents’) are and will be written in the English language only. In the event of any inconsistency between any Document in the English language and any translation of it into another language, the English-language Document shall prevail. If you are acquiring the Cisco Firmware on behalf of any part of the U.S.

Government, the following provisions apply: The Cisco Firmware and accompanying documentation are deemed to be ‘commercial computer software’ and ‘commercial computer software documentation’, respectively, under DFAR Section 227.7202 and FAR 12.212(b), as applicable. Any use, modification, reproduction, release, performance, display or disclosure of the Cisco Firmware and/or the accompanying documentation by the U.S. Government or any of its agencies shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement. Any technical data provided that is not covered by the above provisions is deemed to be ‘technical data-commercial items’ under DFAR Section 227.7015(a). Any use, modification, reproduction, release, performance, display or disclosure of such technical data shall be governed by the terms of DFAR Section 227.7015(b). Cisco is a trademark of Cisco, LLC in the United States and worldwide.

CONTACT US

  • Worldwide Headquarters:

  • Regional headquarters for Europe, the Middle East and Africa:
    Tel. +39 02 0061 6189

  • Regional headquarters for the United Kingdom:
    Tel. +44 2078 553 132

  • Regional headquarters for France:
    Tel. +33 1 82 88 33 6

  • Regional headquarters for Australia and New Zealand:
    Tel: +61 401 747 403

© 2021 Cisco and/or its affiliates. All rights reserved.

References

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals