Do you have a question about the Phantom II and is the answer not in the manual?
Questions and answers
Subscribe to Our Youtube Channel
Summary of Contents for Cal Amp Phantom II
Page 1
Operating Manual Phantom II Wireless Ethernet Bridge/Serial Gateway PN 001-0000-600 Rev A January 2016 299 Johnson Ave, Suite 110 Waseca, MN 56093 Phone: (800) 992-7774 Fax: (507) 833-6748 www.cal amp.c om...
Page 2
Phantom II Important User Information Warranty CalAmp. warrants that each product will be free of defects in material and workmanship for a period of one (1) year for its prod- ucts. T he warranty commences on the date the product is shipped by CalAmp. CalAmp’s sole liability and responsibility under this warranty is to repair or replace any product which is returned to it by the Buyer and which CalAmp.
Page 3
Phantom II Important User Information (continued) About This Manual It is assumed that users of the products described herein have either system integration or design experience, as well as an understanding of the fundamentals of radio communications. Throughout this manual you will encounter not only illustrations (that further elaborate on the...
Page 4
This device has been modularly approved. The manufacturer, product name, and FCC and Industry Canada identifiers of this product must appear on the outside label of the end-user equipment. WARNING SAMPLE LABEL REQUIREMENT: For Phantom II FCCID: NS908P24 FCCID: NS908P25 IC: 3143A-08P24 IC: 3143A-08P25 This device complies with Part 15 of the FCC Rules.
Page 5
Phantom II CSA Class 1 Division 2 Option CSA Class 1 Division 2 is Available Only on Specifically Marked Units If marked this for Class 1 Division 2 – then this product is available for use in Class 1, Division 2, in the indicated Groups on the product.
Page 6
Phantom II Revision History Rev 0 Initial release March 2010 Rev 1 Changes made to properly reflect CalAmp branding. April 2010 Rev 2 Changes to section 2.0 and 6.0, Appendix B February 2011 Rev 3 Added IP Discovery Appendix A, Sec 3.1.2 Firmware Upgrade...
RS232, RS422, or RS485 interface. A ROUTER forwards data across internetworks (different subnets). The small size and superior performance of the Phantom II makes it ideal for many applications. Some typical uses for this modem: ...
Page 11
Optional Class 1 Div 2 Supporting co-located independent networks and with the ability to carry both serial and IP traffic, the Phantom II supports not only network growth, but also provides the opportunity to migrate from asynchronous serial devices connected today to IP-based devices in the future.
TCP, UDP, TCP/IP, TFTP, ARP, ICMP, DHCP, HTTP, HTTPS*, SSH*, SNMP, FTP, DNS, Serial over IP, QoS (* Only available in –AES) Tip: Future enhancements of the Phantom II products may Operating Modes: Master, Remote, Repeater r equir e higher c ur r ent requirements than listed.
Page 13
Phantom II 1.0 Overview 1.2 Phantom II Specifications (Continued) Environmental Operation Temp: F(-40 C) to 170 F(75 Humidity: 5% to 95% non-condensing Mechanical 2.25” (57mm) X 3.75” (95mm) X 1.75” (45mm) Dimensio ns: Weigh t: Approx. 237 grams (8 oz)
CFG button for 8 seconds - the Status Open a Web Browser and enter the IP Address of the Phantom II LED will initially blink, then be on into the URL address line ...
Select Network Configuration > Local IP Config. Assign unit IP Address, Subnet Mask and Gateway. [Submit] NOTE: If the Local IP Address of the Phantom II is changed to a new network, the PC NIC IP Address must also be reassigned to the new network.
Connect power adapters to 120 VAC outlets and to each Phantom II Using a diagnostic serial cable, connect the DIAGNOSTICS port of the Phantom II that will be the MASTER device to an available COM port on the PC 2.2.3 Serial Configuration ...
Address, Subnet Mask, Press [U] to SAVE the configuration changes Gateway for the Phantom II. Press [Esc] twice to return to the MAIN MENU (For basic testing, the Gateway value is not critical.) Select [C] Radio Configuration If a connection is being made to a...
2.0 Quick Start 2.2.5 Remote Configuration Remove the Serial connection from the MASTER device and connect it to the next Phantom II. Press [Enter] to open the log in prompt Enter default user name (admin). Press [Enter] Enter default password (admin). Press [Enter]...
With both units powered-on, in proximity to each other, their RSSI LEDs should be illuminated With the PC connected to one of the Phantom II units with an Ethernet cable, open a web browser and enter the IP Address of ‘the other’ unit to verify a wireless connection ...
The Phantom II provides a fully enclosed, stand alone modem, requiring only cabled connections. The Phantom II can be used on a table top like surface, or using the mounting holes provided can be mounted anywhere for a permanent solution.
Phantom II 3.0 Hardware Description 3.1.1 Phantom II Mechanical Drawings Phantom II Nano IP Enclosed Top View Top View Front Image 3-2: Phantom II Top View microhard SYSTEMS INC. Phantom II STA TUS DIA GNOST I C RSSI TX RX CONFIG...
Phantom II 3.0 Hardware Description 3.1.2 Connectors and Indicators 3.1.2.1 Front On the front of the Phantom II is the USB port, DIAGNOSTIC port, CONFIG Button, and the RSSI, STATUS, TX and RX LED’s. microhard SYSTEMS INC. Phantom II STA TUS...
Phantom II 3.0 Hardware Description 3.1.2 Connectors and Indicators 3.1.2.2 Rear On the back of the Phantom II is the Data port, RS485/422 interface, Ethernet port, as well as the power connections. A N TENNA RS485/422 DA TA ETHER N E T...
Phantom II 4.0 Operating Modes A Phantom II may be configured for any operating mode. This is very convenient for purposes of sparing and becoming familiar with their configuration menus. 4.1 Master One per network, the source of synchronization for the system. The Master controls the flow of data through the system.
Phantom II 5.0 Network Topologies The Phantom II may be configured to operate in a number of different operating modes and participate in various network topologies. Note: This section describes radio network topologies in general The RADIO network topology and includes examples of corresponding Radio Configuration determines the paths available settings.
Phantom II 5.0 Network Topologies 5.2 Point-to-Multipoint (PMP) In a Point-to-Multipoint network, a path is created to transfer data between the Master modem and numerous remote modems. The remote modems may simply be Remotes with which the Master communicates directly, and/or Remotes which communicate via Repeaters.
Page 28
Phantom II 5.1 Network Topologies Example 5.2.1 (continued) Image 5-4: PMP Example 5.2.1: Repeater The ROAMING address for the REPEATER is set to 1: the UNIT ADDRESS of the MASTER. This means that this REPEATER will synchronize to, and communicate directly with, the MASTER.
A device located at a pump station must communicate bi- directionally with another device at a water tank. The MASTER Phantom II must reside in an office at a separate location. Image 5-7: P2P Example 5.3.1: Master All Phantom II modems within a particular network must be config- ured to have the same Network Type.
Phantom II 5.1 Network Topologies 5.4 Everyone-to-Everyone (E2E) E2E mode is used for communications between all remote mo- dems. i.e. data from every modem is broadcast to every other modem in the network. Considering the amount of data re-broadcasting (via the Master), it An E2E network requires a is a very bandwidth-intensive network topology.
Page 33
Phantom II 5.0 Network Topologies Example 5.4.1 (continued) Each unit must have its own unique Unit Address. Image 5K: E2E Example 5.4.1: Remote The Remotes will all be configured as per the above screen cap- ture, with the exception of the UNIT ADDRESS. Each Remote (of the 3 in this example) must have its own unique UNIT ADDRESS, e.g.
selecting and inputting the desired operational parameters All configuration of the Phantom II is accomplished with a PC as shown in Section 2.0 There are no DIP switches to set; switches which may subsequently become inadvertently misadjusted or intermittent.
Phantom II 6.0 Configuration 6.1.1 Logon Window Upon successfully accessing the Phantom II using a Web Browser, the Logon window will appear. For security, do not allow the web browser to remember the User Name or Password. Image 6-1: Logon Window...
Page 36
- particularly once the unit is deployed in the field - for one primary reason: security. Image 6-2: Logon Window With Password Input Soft Buttons Inputs the selected values into the Phantom II for processing. Cancel Cancels the logon process.
Phantom II 6.0 Configuration 6.1.2 Welcome Window The Welcome window displays the specific Phantom II’ name (entered as the Radio Description in the System Configuration menu). This name quickly confirms the ’identity’ of the unit being perused and appears in all menu windows.
System Operation Mode The radio button options presented here determine whether the Phantom II unit will operate at a BRIDGE or a ROUTER. Only a MASTER unit should ever be configured as a router. Select the System Operation Mode ‘first’, i.e. prior to configuring other options within the unit.
Page 39
Radio Description The Radio Description is simply a convenient identifier for a specific Phantom II, e.g. Pump Station 5, 123 Main Street, etc. This feature is most welcome when accessing units from afar with large networks: a convenient cross-reference for the unit’s IP address.
Page 40
Phantom II 6.0 Configuration UTC Time Offset (+/-hh:mm) Input the Universal Coordinated Time offset in this field, if so desired. + indicates that local time is ahead of UTC time; - behind. Values 00:00 valid time values, where = 2-digit hours...
Page 41
System Default Button Enabled by default, when the CONFIG button on the front of the Phantom II is held down for 10s while the unit is powered up, the unit will reset and all settings will be reset to factory defaults. When disabled the unit will reset, but the setting will not be overwritten.
Page 44
IP Address If DHCP is selected (see above), a unique IP address will be assigned to the Phantom II; if STATIC IP address mode has been selected, enter a suitable value for the specific network. Values Within any IP network, each device must have its own unique 192.168.1.254...
Page 45
Phantom II modems are being used, make the gateway of In typical networks, a router acts Phantom II No. 1 = IP address of Phantom II No. 2; gateway of as a gateway. Phantom II No. 2 = IP address of Phantom II No. 1. The idea behind this approach is: If a Phantom II at ‘one end’...
Page 46
Phantom II 6.1 Configuration DNS Mode The setting determines whether the Phantom II unit will have its DNS Server information entered manually (static) or if it will obtain the information (provided it is available) via the connected network. Values static...
6.0 Configuration 6.1.4.1 Local IP Configuration 6.1.4.1.2 Router If the Phantom II unit has been configured as a Router (under the System Configuration menu), the Network Configuration will present some additional options to those presented if the unit was configured as a Bridge.
Phantom II 6.0 Configuration 6.1.4.1.2.1 Wireless Port IP Configuration Image 6-8: Network Configuration (Router), Wireless Port IP Configuration Submenu IP Address This address MUST be STATIC (i.e. DHCP is not applicable). Values Within any IP network, each 192.168.2.1 device must have its own unique IP address.
Phantom II 6.0 Configuration 6.1.4.1.2.2 VPN Configuration VPN: Virtual Private Network. A communications path connecting a device on a WAN with a device on a LAN. Image 6-9: Network Configuration (Router), VPN Configuration Submenu A Virtual Private Network (VPN) may be configured to enable a direct communications link between one device on the WAN and another on the LAN.
NTP server available and its IP address or ’name’ is entered in the appropriate field. NTP may be used to synchronize the time in the Phantom II within a network to a reference time source. Image 6-10: Network Configuration, NTP Server Config. Submenu NTP Server Status Note that if NTP Server Status is ENABLED, the ‘Synchronize with...
If this feature is to be utilized, it would be enabled on the Master Phantom II unit, noting that such a DHCP Server service must not be enabled on any other Phantom II units or devices which reside on the same network segment.
Page 55
- either wired (e.g. LAN) DHCP Server, must have their local IP settings set for ‘DHCP’ (as or wireless (e.g. another opposed to ‘static’) Phantom II) with an active DHCP SERVER service. (The Server issues IP address Values information at the request of a...
Page 56
Phantom II 6.0 Configuration Server Subnet Not to be confused with the Server Netmask (see below). Enter the network’s ‘root’ address, e.g. if devices are to be assigned addresses such as 192.168.1.5 and 192.168.1.6, enter 192.168.1.0 in this field. Values 192.168.2.0...
Page 57
Phantom II 6.0 Configuration Ending Address This is the ending (‘upper boundary’) IP address of the range of IP addresses to be issued by the DHCP Server to the applicable devices on the network. Values 192.168.2.239 IP address as per above Gateway Address Input the address of the desired gateway.
Page 58
IP address is to be bound. For the Phantom II, the MAC address of the unit may be found on the label on the bottom of the unit, or it may be viewed on the Network Configuration menu of that unit.
Page 59
Server Config. menu display, showing both the MAC and corresponding IP address. Note that the ADD action must be followed by SUBMIT for the changes to be written to the Phantom II’ memory. Delete If binding relationships are present, the drop down box (to left of Delete soft button) may be used to select a particular binding, and the DELETE soft button used to delete it.
Phantom II 6.1 Configuration 6.1.4.4 SNMP Agent Configuration The Phantom II may be configured to operate as a Simple Network Management Protocol (SNMP) agent. Network management is most important in larger networks, so as to be able to manage resources and measure performance.
Page 61
Phantom II 6.0 Configuration Image 6-12: Network Configuration, SNMP Agent Config. SNMP Operation Mode If disabled, no SNMP service is provided from the device. Enabled, the device - now an SNMP agent - can support SNMPv1, v2, & v3. Values...
Page 62
Phantom II 6.0 Configuration Read Only Community Name (continued) Values public character string Read Write Community Name Effectively a plain-text password mechanism used to weakly authenticate SNMP queries. Being part of the community allows the SNMP agent to process SNMPv1 and SNMPv2c requests. This community name has only READ/WRITE priority.
Page 63
Phantom II 6.0 Configuration V3 User Authentication Level Defines SNMPv3 user’s authentication level. NoAuthNoPriv: No authentication, no encryption. AuthNoPriv : Authentication, no encryption. AuthPriv: Authentication, encryption. Values NoAuthNoPriv NoAuthNoPriv AuthNoPriv AuthPriv V3 Authentication Password SNMPv3 user’s authentication password. Only valid when V3 User Authentication Level set to AuthNoPriv or AuthPriv (see above).
Page 64
Phantom II 6.0 Configuration SNMP Trap Version Select which version of trap will be sent should a failure or alarm condition occur. Values V1 Traps V1 Traps V2 Traps V3 Traps V1&V2 Traps V1&V2&V3 Traps Auth Failure Traps If enabled, an authentication failure trap will be generated upon authentication failure.
In most deployments, Spanning Tree Protocol (STP) will not be required. It does consume a small amount of bandwidth. The default is ‘Off’. Note that this menu item will not appear if the Phantom II unit is configured to be a router. STP: Spanning Tree Protocol is...
6.0 Configuration 6.1.4.6 Quality of Service Quality of Service (QoS) may be applied to various data which enter the Phantom II. This section describes configuring QoS for data which enters via the Ethernet port. QoS: Quality of Service applied to networks where it is...
Page 68
Phantom II 6.1 Configuration Example 6.1.4.6.1 Assume that we want to add high priority to TCP traffic on Port 8080: In the IP Port field, enter 8080. Select the radio button for TCP. Select the radio button for High Priority.
Prior to configuration, the network topology must be known (see Section 5.0); the role (operating mode) of the specific Phantom II must also be known. Image 6-16: Radio Configuration Menu (upper portion)
Page 71
Phantom II 6.0 Configuration Network Search Mode (continued) Image 6-17: Radio Configuration Menu (upper portion), with Network Search Mode Enabled With Network Search Mode enabled, Master units with the same authentication key may be found by Remote units even if they have different network names.
Page 72
Operation Mode Select the mode of operation for the Phantom II: Master, Repeater, or Remote. A Phantom II may be configured for any role required within a radio network. This is convenient for reasons of familiarity with any/all units, as well as for hardware sparing purposes.
Page 73
Public Character string Network Name All Phantom II modems in a given network must have the same Network Name. This unique network address is not only a security feature for a particular network, but also allows other networks - with their own unique network address - to operate in the same area without the possibility of undesired data exchange between networks.
Page 74
RF Output Power This setting establishes the transmit power level which will be presented to the antenna connector at the rear of the Phantom II. Unless required, the RF Output Power should be set not for FCC regulations allow for up to...
Page 75
Remotes is divided by 1 plus the Type (below). Retransmissions value. PTP: Phantom II will retransmit to its counterpart only if necessary, and to a maximum number of the value specified in its Retransmissions field. Packet is discarded if retransmissions are not successful.
Page 76
Phantom II 6.0 Configuration Network Type (continued) Point-to-Multipoint with ACK is a configuration whereby the Network functions as a Point-to-Multipoint, but the Retransmissions behave Keep in mind that the Network as a combination of PTP and PMP in that: If retransmissions are...
Page 77
Values 1-65535 Tx Control This configuration option does not apply to a Master Phantom II. On (the default) permits the Phantom II to transmit, i.e. RF emissions are enabled. Off configures the Phantom II for RECEIVE ONLY. If ‘Off’ is selected, ‘On’...
Page 78
Remote and the Master; the Repeater will have a Roaming Address altogether. of 1 as it is to synchronize to the Master. The Roaming Address dictates to which Phantom II (by Unit Address (UA)) a Remote (or Repeater) will ’look’ or ’attach to’ for its upstream signal path.
Page 79
Exercising the option of back-to- back ‘Repeaters’ - which Values requires 2 Phantom II modems at a ‘Repeater’ site - eliminates the division of bandwidth. If there is more than one Repeater in a network, the Repeaters should be ‘registered’.
Page 80
Phantom II 6.0 Configuration Optimization This setting applies to the Master only. ‘Balanced’ is the default setting and is typically the best choice for ‘Optimization’. The other options are High Throughput (when throughput is a priority) and Low Latency (best suited to small packets).
Page 81
Phantom II 6.0 Configuration Zone Restriction (continued) Zone Restrict From Restrict To Restrict From Restrict to Start (MHz) End (MHz) Start (MHz) End (MHz) 923.200 927.600 902.400 902.800 924.000 927.600 902.400 903.600 924.800 927.600 902.400 904.400 925.600 927.600 902.400 905.200 926.400...
Page 82
Phantom II 6.0 Configuration Channel Number This setting applies only if the Link Rate is set to 1.2 Mbps. Channel Number defines the number of channels the unit will hop on. The minimum number is 4. (Digital Transmission System (DTS) technology is applied at the 1.2 Mbps link rate.)
Page 83
Defines how long the unit will keep awake. If set to 0, the radio will not wakeup until data is received from the serial or Ethernet port. The Phantom II will enter sleep Values mode after 60 seconds when the system is rebooted.
Page 84
Values 1-65535 (seconds) Frequency Restriction By default, the Phantom II will hop on frequencies across the entire 902-928 MHz ISM band. For some applications or within certain operating environments it may be desired to prohibit the modem from operating on specific frequencies or range(s) of frequencies.
Page 85
A number of input fields may be used, or a combination of restrictions input in one field. The image below shows an example of configuring a Phantom II (with 345 kbps as an available Link Rate) to not operate on Use the Radio Channels Noise channels 1 through 10.
Page 86
Phantom II 6.0 Configuration Frequency Restriction (continued) Channel Numbers can be calculated based on the frequency and link rate (determines channel spacing). For 900 MHz Models: Channel 1 is at 902.4MHz. Therefore, to calculate the frequency of channel n: Freq channel n = 902.4 + ((n-1) x CW) MHz.
Page 87
Phantom II 6.0 Configuration Frequency Restriction (continued) With the Phantom II having the option of, and configured for, a Link Rate of 1.2 Mbps, the Frequency Restriction input format remains the same (as for 345 kbps described previously), however, the Channel Number must be reduced by the number of channels restricted, i.e.
Page 88
In order to ensure that generated hopping patterns are orthogonal to each other (thereby minimizing possible interference between network segments), if there is more than 1 Repeater in a network, ALL Repeaters must be registered in EVERY Phantom II. The following image depicts an example: Image 6-21: Repeater Registration In the above example, there is a total of 3 Repeaters in the system, with Unit Addresses of 7, 18, and 25.
COM2, the front DE9 connector, respectively. Serial device data may be brought into a LAN network through TCP, UDP, or multicast; it may also exit the Phantom II network on another Phantom II’ serial port. COM1 is a full-featured RS232 interface dedicated to serial data traffic.
Page 91
Phantom II 6.0 Configuration Image 6-23: COM1 Configuration Menu (including lower portion) Port Status Select operational status of port. Enabled by default. *COM2 is Disabled by default. If COM2 is Enabled and there is a desire to switch it back to Disabled (console mode) via the serial connection to it, the escape sequence of ‘+++’...
Page 92
Phantom II 6.0 Configuration Channel Mode (continued) Values RS232 RS232 RS485 RS422 Data Baud Rate The serial baud rate is the rate at which the modem is to communicate with the attached local asynchronous device. *COM2 data baud rate maximum is 115200 bps.
Page 93
‘None’. When CTS Framing is selected, the Phantom II uses the CTS Software flow control (XON/ signal to gate the output data on the serial port. Figure 6A below XOFF) is not supported.
Page 94
This setting defines the serial output data framing. In Transparent mode (default), the received data will be output promptly from the Phantom II. When set to Seamless, the serial port server will add a gap between data frames to comply with the MODBUS protocol for example.
Page 95
Phantom II 6.0 Configuration Character Timeout (continued) Example: If the baud rate is 9600 bps, it takes approximately 1ms to move one character. With the Character Timeout set to 4, the timeout period is 4ms. When the calculated time is less than 3.5ms, the serial server will set the character timeout to a minimum...
Page 96
TCP Client: When TCP Client is selected and data is received on Protocol Config field will its serial port, the Phantom II takes the initiative to find and connect determine which configuration to a remote TCP server. The TCP session is terminated by this...
Page 97
IP address, the port essentially ‘fine tunes’ where the data is to go TCP Client/Server: In this mode, the Phantom II will be a ‘within the device’. combined TCP Client and Server, meaning that it can both initiate and serve TCP connection (session) requests.
Page 98
IP Protocol Config (continued) UDP Point-to-Point: In this configuration the Phantom II will send serial data to a specifically-defined point, using UDP packets. This same Phantom II will accept UDP packets from that same point. Remote IP Address IP address of distant device to which UDP packets are sent when data received at serial port.
Page 99
UDP multicast, typically Remote IP Address the MASTER would be The IP address of a distant device (Phantom II or, configured as ’(P)’ (the POINT) for example, a PC) to which the unit sends UDP and the REMOTES would be configured as ’(MP)’...
Page 100
UDP packets sent by another UDP Multipoint-to- Multipoint unit. Default: 20011 SMTP Client: If the Phantom II network has Internet access, this protocol may be used to send the data received on the serial port (COM1), in a selectable format (see Transfer Mode (below)), to an e-mail addressee.
6.1.7 USB Configuration The USB Device Port Mode allows a user to define the operation of the Phantom II‘s USB Port. The port can be configured to be used as any one of the following: Console Mode Provides support for the USB-to-Serial console port.
Phantom II 6.1 Configuration 6.1.8.2 Upgrade Password Configuration The Upgrade Password protects the Phantom II from having a package upgrade performed by an unauthorized person. It is recommended that the default password be changed when the system is deployed. Image 6-25: Security Config., Upgrade Password Config. Submenu...
Phantom II 6.0 Configuration 6.1.8.3 Wireless Encryption Configuration There are 2 encryption levels for the Phantom II: Medium High Medium and High levels are NOT AVAILABLE FOR EXPORT. High level is optional within North America: Contact CalAmp. for more information.
Page 107
Phantom II does require that the corresponding decryption algorithm be applied to the output data of the receiving Phantom II to make it meaningful. Compression requires processing time. Depending on the nature of the data, throughput may be either enhanced or not effected by the compression process.
Page 108
Generate Key soft button. Do the same for the remaining keys, using a different key phrase each time. Using the same Key Phrase(s) on all Phantom II modems in the network will generate the same Keys on all units. All units must operate with the same Key selected.
For security reasons, any or all may be disabled. the target device. If the above IP address is that of a Phantom II accessible via the network, the user will arrive at the unit’s LogOn window. For a secure connection, see ‘SSH’...
Phantom II: Local Using the Admin or Upgrade access and associated passwords - the authentication is done ‘locally’ within the Phantom II, and RADIUS&Local RADIUS authentication (using a specific user name and password supplied by your RADIUS Server...
Page 113
Phantom II 6.0 Configuration Auth Mode Select the Authentication Mode: Local (default) or RADIUS&Local. For the latter selection, RADIUS authentication must be attempted FIRST; if unsuccessful, THEN Local authentication may be attempted. Values Local RADIUS&Local Local RADIUS Server IP In this field, the IP address of the RADIUS server is to be entered if RADIUS&Local has been selected as the Authorization Mode.
Page 114
Phantom II 6.1 Configuration RADIUS Secret If the Phantom II’ Authorization Mode has been set to RADIUS&Local, obtain the RADIUS Secret for his particular client from your RADIUS Server Administrator and enter it into this field, and the following field. (You will also want to obtain the applicable RADIUS User Name from your RADIUS Server Administrator.)
This security feature differs from those discussed in the ‘UI Configuration’ section; the UI Configuration is specifically for configuring the Phantom II’ User Interface and related protocols. Image 6-30: Security Config. Menu, Firewall Configuration Submenu Firewall Status Disabled by default.
Page 117
Destination Zone Select the zone which is the intended destination of the data traffic. WAN applies to the wired connection and LAN to the wireless, on all Phantom II units, whether a Master, Repeater, or Remote. Values Policy Select the policy (action) which is to apply. ACCEPT (traffic) is the default.
Phantom II 6.0 Configuration 6.1.8.6.2 Rules Configuration They are configured to ‘fine Rules take precedence over Policies. tune’ firewall settings. Image 6-32: Firewall Configuration, Rules Config. Submenu Action Define the action which is to be taken by the defined rule.
Page 121
Phantom II 6.0 Configuration Select Service This field allows for the rule to be applied to either a Custom Service (defined further down the menu) or for one of many predefined services available via a pull down menu. Values Custom Service...
Page 122
Phantom II 6.0 Configuration Protocol This field is configured if defining a Custom Service (ref. Select Service field). Values TCP:SYN ICMP IPP2P IPP2P:UDP IPP2P:all Comment This is simply a field where a convenient reference or description may be added to the rule.
6.1.8.6.3 Port Forwarding Configuration Image 6-33: Firewall Configuration, Port Forwarding Config. Submenu Internal Server IP Enter the IP address of the intended internal (i.e. on LAN side of Phantom II unit configured as a Router) server. Values 192.168.2.5 valid IP address Internal Port Target port number of internal server.
Page 124
Phantom II 6.0 Configuration Protocol Enter the protocol to be forwarded to the intended internal (i.e. on LAN side of Phantom II unit configured as a Router) server. Values TCP:SYN ICMP IPP2P IPP2P:UDP IPP2P:all External Port Port number of incoming request (from WAN-side device).
Phantom II 6.0 Configuration 6.1.8.6.4 MAC List Configuration Image 6-34: Firewall Configuration, MAC List Config. Submenu WAN MAC List Status Enable or disable the WAN MAC list. List takes precedence over Rules. Values Disable Enable Disable LAN MAC List Status Enable or disable the LAN MAC list.
Page 126
Phantom II 6.0 Configuration MAC Address Specify the MAC Address to be added to the list. Values 00:00:00:00:00: 00 valid MAC address Disposition Determines the action to be taken on data traffic associated with the specified MAC address. Values ACCEPT...
Phantom II 6.0 Configuration 6.1.8.6.5 Blacklist Configuration Image 6-35: Firewall Configuration, Black list Configuration Submenu WAN Blacklist Status Enable or disable the WAN blacklist. List takes precedence over all other firewall settings. Values Disable Enable Disable LAN Blacklist Status Enable or disable the LAN blacklist.
Phantom II 6.0 Configuration 6.1.9 System Information The System Information menu affords a selection of a number of very useful tools for diagnostic and statistical purposes. The information accessible via this menu, particularly when accessed on remote units wirelessly, provides an excellent aid to troubleshooting and network management.
Page 130
Ethernet port (hardware interface) on the rear of the Phantom II. Received and Transmitted information are applicable to the local data traffic into and out of the Phantom II, respectively. Errors which are counted include alignment, frame check sequence (FCS), frame too long, and internal MAC.
Page 131
Phantom II 6.1 Configuration Radio Information The Radio Information window provides information related to the ‘radio’ (wireless) portion of the Phantom II. Serial Number Serial number of radio (RF) module within Phantom Version Firmware version within radio module.
Page 133
Phantom II 6.1 Configuration COM1 Connection Status This window displays information related to the primary RS-232 serial interface (COM1 on the rear of the Phantom II). COM1 Port Status Enabled by default. Configure via COM1 Configuration menu. COM1 Connect As Display of chosen protocol with respect to serial gateway function.
Page 134
Phantom II 6.1 Configuration COM2 Connection Status This window displays information related to the COM2 port located on the front of the Phantom II. COM2 Port Status Disabled (for ‘data’ traffic) by default. Being ’disabled’ enables the port to be used for the Text User Interface.
Page 135
Phantom II 6.0 Configuration USB Connection Status This window displays information related to the USB port located on the front of the Phantom II.. USB Port Status Display the Status of USB Port. Configure via USB Configuration menu. USB Connect As Display of chosen protocol with respect to serial gateway function.
(firmware). Select the Browse button to locate the upgrade file provided by CalAmp. Using the Erase Settings checkbox tells the Phantom II not to store the current configuration settings, therefore once the upgrade process is complete the unit will have factory de-fault settings (Including the default IP).
6.0 Configuration 6.1.10.3 Reset System to Default There are many configuration options for the Phantom II units. Should a unit reach a state where it is not performing as desired and it is possible that one or many configuration options may be...
Page 141
Phantom II 6.1 Configuration Image 6-48: System Tools, Radio Channels Noise Level, Max Value Soft Buttons Hold Do not refresh currently displayed values. Clear Clear current values and take new measurements. Show Mean Value (shown as green...
6.1.10.5 Network Discovery This tool may be used to search the current network to find additional Phantom II units and report the IP Address, Unit Address and Description of each unit. The Refresh button will force the Phantom II to search the network.
Page 143
Phantom II 6.0 Configuration Power Saving Mode (continued) Serial Port Wakeup: Unit will wakeup from serial port or radio data if Radio Awak e Time is nonzero value. Power consumption is about 15-25mA @ 12VDC. Ethernet Port Wakeup: Unit will wakeup from Ethernet port or radio data if Radio Awak e Time is a nonzero value.
Page 144
Phantom II 6.0 Configuration Radio Sleep Time Defines how long the radio will sleep. If set to 0, the radio will not enter sleep mode. Values 0 - 65535 (seconds) Idle Time Defined the amount of system idle time required before going entering power saving mode cycle.
Network Topology undertaken only by qualified and experienced personnel. Section 5.0 detailed the various network topologies which the Phantom II will support. Determine which topology is suited to your specific requirements. Throughput The Phantom II is capable of significant data throughput.
Required transmit power is dictated pri- marily by distance, antenna type (specifically the ‘gain’ of the anten- nas being used), and the receive sensitivity of the distant Phantom II. Cable and connector losses (the physical path from the modem’s ‘antenna connector’...
Power Requirements The Phantom II accepts a range of DC input voltages (keep in mind that supply current requirements must also be met). In some deploy- ments, power consumption is critical. Power consumption for the Phantom II may be minimized by reducing the transmit power, given the receive sensitivity of the distant modem.
Phantom II 7.0 Installation 7.1 Path Calculation Assuming adequate antenna heights, a basic formula to determine if an adequate radio signal path exists (i.e. there is a reasonable fade FCC regulations allow for up to 36dBi effective isotropic margin to ensure reliability) is: radiated power (EIRP).
Phantom II 7.0 Installation Once the equipment is deployed, average receive signal strength may be viewed in the System Information, Radio Information display. To satisfy FCC radio frequency (RF) exposure requirements for mobile transmitting 7.2 Installation of Antenna System Components...
Direct human contact with the ’polarized’. antenna is potentially unhealthy when a Phantom II is generating A Yagi has a more focused antenna pattern, which results RF energy. Always ensure that in greater gain: commonly, 6-12dBi. The pattern of a Yagi...
Phantom II 7.0 Installation The path calculation (see Section 7.1) will determine the antenna gain requirements. Refer to the beginning of this section to review the various factors which must be considering when deploying a net- work. Do not discount the importance of the REQUIRED HEIGHT for the antennas within your network.
Phantom II 7.0 Installation 7.2.4 External Filter Although the Phantom II is capable of filtering-out RF noise in most environments, there are circumstances that require external filtering. Paging towers and cellular base stations in close proximity to the Phantom II antenna can desensitize the receiver. CalAmp’s external cavity filter eliminates this problem.
In the sample, there is one Phantom II connected to same network to which the PC is connected. Activating the Refresh (IP) soft button results in the Phantom II being discovered by the utility:...
Phantom II Appendix B: Upgrade Process (DOS Prompt) FTP Firmware Upgrade To logon, perform the following steps: Open a command prompt and type “ftp <ip address>” and <enter>. Login: type “upgrade” and <enter> Password: type “admin” and <enter> To upgrade the firmware, perform the following steps: Type “binary”...
Page 156
Phantom II Appendix B: Upgrade Procedure (DOS Prompt) Saving a Configuration File To logon, perform the following steps: Open a command prompt and type “ftp <ip address>” and <enter>. Login: type “upgrade” and <enter> Password: type “admin” and <enter> To download a Configuration File to your pc, perform the following steps: Type “ascii”...
Page 157
Phantom II Appendix B: Upgrade Procedure (DOS Prompt) Loading a Configuration File To logon, perform the following steps: Open a command prompt and type “ftp <ip address>” and <enter>. Login: type “upgrade” and <enter> Password: type “admin” and <enter> To upload a Configuration File to your pc, perform the following steps: Type “ascii”...
Figure C1 illustrates a typical 2-wire RS485 wiring configuration. The cable pair is shared for both transmit and receive data: it is very important that the Phantom II seize control of the line at the proper time when it is to transmit data.
Phantom II Appendix D: Serial Interface Module Host (DCE) Microprocessor Arrows denote the direction that signals are asserted (e.g., DCD Signal (DTE) originates at the DCE, informing the DTE that a carrier is present). DCD The interface conforms to standard RS-232 signals without level shifting, so direct connection to a host microprocessor is possible.
Appendix F: UL Certifications This equipment is suitable for use in Class I, Division 2, Groups A, B, C and D OR non-hazardous locations only. Combinations of equipment in your system are subject to investigation by the local Authority Having Jurisdiction at the time of installation.
Page 164
299 Johnson Ave, Suite 110 Waseca, MN 56093 Phone: (800) 992-7774 Fax: (507) 833-6748 www.cal amp.c om...
Need help?
Do you have a question about the Phantom II and is the answer not in the manual?
Questions and answers