This guide gives an overview of the device user interface and explains the step-by-step procedure to configure, manage and monitor the device by using Graphical User Interface. Related Documents For more information, please refer to the following additional documents available at Proxim support site http://support.proxim.com. •...
Reset / reboot a device. • : Proxim BlueConnect is only applicable to Edge 1015 and 1025 series. 1.1.2 Graphical User Interface GUI provides an easy way to configuration settings and retrieve network statistics from any computer on the network. You can access the GUI through either LAN device, a browser through an Internet connection, or through an Ethernet cable directly connected to your computer’s Ethernet port.
Provide the Read Community Password. By default, the password is public. • Provide the Read/Write Community Password. By default, the password is public. For details on how to configure the device through SNMP Interface, refer to Reference Guide available on Proxim website at http://support.proxim.com. ®...
Page 9
Scheduled Bulk Operations and Task - Backup, Software Upgrade and Bulk SNMP Parameter Configuration • Configuration Management - Device Configuration. ® For details, refer to ProximVision Advanced Installation and Management Guide available on Proxim website at http://support.proxim.com. Device Management Guide...
Home screen displays two options - Scan and QR Scan. You can connect your mobile device to nearby Proxim devices with Scan option while the QR Scan is used to connect to a Proxim device by scanning its QR code. See figure below.
Proxim Blue Connect 2.1.4 Settings Change the language by selecting any of the following languages from the Settings option. • English • French • Spanish • Japanese • Chinese Tap Settings and select a language. 2.1.5 Connect to a device Connect using scan feature 1.
2. A bluetooth permission pop-up appears on the screen. Tap Yes and then tap OK to turn ON buletooth. This will initiate the scanning process. After scanning, a screen appears as below showing the available Proxim devices. 3. Tap on a device from the scanned list that you want to connect with.
Proxim Blue Connect A maximum of 8 devices can be paired with the mobile device. If you pair the 9th device, all the 8 devices will be un-paired automatically. Allow all the app permission pop-up messages at first login after installing the BLE App.
Proxim Blue Connect 2.1.9 Disconnect Disconnect from all the connected devices by tapping on “Disconnect” . This action will take you back to the home screen. 2.1.10 Rescan Connect a new device without disconnecting the current device by tapping on “Rescan”...
Proxim Blue Connect Link Quality displays the information only when the WORP link is established between BSU and SU. It shows empty values when the WORP link is not established. When you connect to a BSU, the SU dropdown displays the available SU's for the user to select.
Page 16
Proxim Blue Connect In the Radio Mode drop down, select BSU / SU, tap OK and then tap Next. See figure below. The System screen appears as below. Device Management Guide...
Page 17
Proxim Blue Connect The system screen displays the Device Name, Location and a provision to Enable / Disable the local GPS. In the system screen, you can choose to either Enable the local GPS or disable it. Select Enable option if you want to get the GPS longitude and GPS latitude values of the mobile phone or tablet.
Page 18
Proxim Blue Connect Enter the parameters such as Address Type, IP Address, Subnet Mask, Default Gateway and Primary DNS. Address Type dropdown displays two options - Static and Dynamic. If you select Static, enter all the parameters such as IP Address, Subnet Mask, Default Gateway and Primary DNS manually.
Proxim Blue Connect Tap Next. The Wireless Security screen appears as shown below: Enter the Network Name and select AES 128 if you want encryption and tap Commit & Reboot to apply the changes. Encryption key length must be of 16 characters.
Accessing the Graphical User Interface 3.1 Accessing the Graphical User Interface To access the Graphical User Interface (GUI), connect the device to a PC or a laptop and enter the default device IP address in ScanTool the address bar (http://169.254.128.132). Alternatively, use ScanTool to access the device. See for more details.
Graphical User Interface Overview 4.1 Graphical User Interface Overview After logging in, the GUI title bar will display at the top of the browser screen, a navigation pane on the left, and a content pane in the center. The default page shown in the content pane is the Setup Wizard / Summary. •...
Page 22
Graphical User Interface Overview Figure 4-1 Graphical User Interface Overview (Admin User) Figure 4-2 Graphical User Interface Overview (Advanced User) Device Management Guide...
Graphical User Interface Overview 4.2 Device Setup Wizard guides the user through initial device installation. Click Wizard on the left navigation pane, configure the parameters and click Finish to complete the setup and reboot the device automatically. Parameters modified in the Wizard applies to the existing configuration of the device. Wizard Operations tab controls device operational modes: 1.
Page 24
Graphical User Interface Overview • For Point to Point link, set one BS3 in "BSU-EPA" radio mode and one BS3 in "SU-EPB" radio mode • For Point to Multipoint, set one BS3 in "BSU" radio mode (license upgrade is needed to support up to 32 subscribers), and set every other BS3 and CPE in "SU"...
Page 25
Graphical User Interface Overview Wizard Link Details tab control device wireless configuration required to establish a link such as Radio Mode, Frequency information and Security encryption. Quick Start consists of frequently used parameters. It is applicable only to selective devices. Click Quick Start on the left navigation pane, configure the parameters and click OK.
Graphical User Interface Overview 4.3 File Management File management tab enables the user to: • Upgrade the firmware (Download the latest version of firmware from http://support.proxim.com). • Retrieve Configuration in order to push it to similar devices. • Retrieve Event Log, Debug log or License Info.
Device. information (License Info file with .lic extension) from the device. For more details, refer Contact Proxim Sales Representative to purchase a license upgrade. Refer to the Technical Note available on http://www.proxim.com/support to generate a unique license file for your device.
Device Management Upgrade License. Upgrade the bandwidth using the license file (.bin extension) generated above. For more details, refer 5.2 File Management The File Management tab enables you to upgrade the firmware and configuration files on the device, and retrieve configuration and log files from the device through Hypertext Transfer Protocol (HTTP) and Trivial File Transfer Protocol (TFTP).
In order to change the encryption key used by the devices, users need to configure the new encryption key in PV Advanced and apply the same on all the managed devices. For more details about modifying the encryption key refer PV Advanced Installation & Management Guide available at http://support.proxim.com. NOTE: •...
Device Management • Enter the name of the Binary, Text Based, or Config Profile file (including the file extension) in the File Name box that you want to download onto the device. 3. If you are upgrading the device with Binary Configuration file, click Upgrade and then Reboot the device or click Upgrade &...
Device Management 5.2.5 Upgrade Certificate Authority To upgrade the certificate authority, follow the below steps: 1. Navigate to File Management > Upgrade Certificate Authority. 2. Click Browse to locate the certificate authority file. 3. Click Upgrade/Upgrade & Reboot to update the certificate authority file on the device. 4.
Device Management 4. Select the file type from the drop-down that you want to retrieve from the device. The file types may vary depending on your device. The File Types are; Config, Event Log, Debug Log, Config Profile, License Info. The Config Profile is used for replicating the configuration of a master device on to other similar devices by excluding the unique parameters like System information, IP configuration, Ethernet configuration, Wireless configuration based on the selection.
Device Management • HIGH SECURE MODE: It represents the Transport Layer Security, TLS 1.2 to provide secured communication. • User can Enable the high secure mode to apply TLS 1.2 only. To Enable the high secure mode, Select Enable and then click OK.
Device Management • Priv Protocol: It represents the type of privacy (or encryption) protocol. Select the encryption standard as either AES-128 (Advanced Encryption Standard) or DES (Data Encryption Standard). • Priv Password: It represents the pass key for the selected Privacy protocol. The default password is public123. •...
Device Management • Event Log Priority: Configure the event log priority such as; Emergency, Alert, Critical, Error, Warning, Notice, Info, Debug. Please note that the priorities are listed in the order of their severity, where Emergency takes the highest severity and Debug the lowest. When the log priority is configured as high, all the logs with low priority are also logged.
Device Management • When you configure a host name instead of an IP address, ensure that you configure DNS server IP on the device. • IPv6 address should be the global IP address and not the link-local IP address. • Time Zone: Configure the time zone from the available list.
Device Management • If MAC ACL is enabled, configure at least one entry in the Management Access Table with the IP address of the PC or the management station to manage the device. • To manage the Access Point device, you can add a maximum of five system IP addresses. •...
Device Management 5.8 System System tab enables you to view LED/RSSI Display. : System is applicable only to point-to-point and point-to-multipoint devices. 5.8.1 RSSI LED Behavior When the link establishes, the Received Signal Strength Indicator (RSSI) LED’s on the scaling mask glows. RSSI LED’s indicates the strength of the link signal.
DFS. This feature helps the engineering team analyze the issues and provide a faster solution. This feature should be used only in consultation with the Proxim Customer Support team. Once logging is enabled, the Debug Log file can be retrieved via HTTP or TFTP.
Tools 6.1 ScanTool Proxim ScanTool is a software utility that runs on Microsoft Windows machine. By using ScanTool, a user can, • Scan Proxim devices connected to the local network • Obtain device IP address • Modify device IP Configuration parameters (IP Address, Address Type, Gateway, etc) •...
Tools This screen contains MAC Address, System Name, IP Address, Uptime, and System Description (comprises of device description, firmware version, serial number, and bootloader version). 5. Click Select Adapter, to change adapter settings. 6. From the list, identify and select the MAC address of the device that needs to be initialized, and click Web Config to log on to the Graphical User Interface.
Tools 6.2 Channel Planning and Link Tools The tools required to monitor the device by using Graphical User Interface are as following: • Spectrum Analyzer • Radio Link Test Tool 6.2.1 Spectrum Analyzer The Spectrum Analyzer actively scans the spectrum to report on interference sources that may impact link performance. This tool is not a replacement for the commercial Spectrum Analyzers as this is only intended to help with channel selection and diagnose performance issues.
Page 43
Tools For single radio devices, no tabs are displayed at the top of the screen for admin user and for spectrum analyzer advanced user, only Interface 1 tab will be displayed. Spectrum Analyzer consists of the following: • Channel Scan Time: Enter the time (ranging from 1000 to 60000 milliseconds) to scan each channel. •...
Page 44
Tools Spectrum Analyzer displays the detected device information such as Bandwidth, Channel number, Frequency, MAC Address, System Name, Mode (End Point A, AP, SU, STA), Encryption, Security, Avg. SNR, and Packet count. Figure 6-8 Spectrum Analyzer - Scan Statistics (Admin and Monitor User) Figure 6-9 Spectrum Analyzer - Scan Statistics (Advanced User) The device information displayed in Advance Scanning mode are described and tabulated below.
Tools Parameter Description Packet Count This parameter displays the Packet Count for the detected device. • Only an Admin / Advanced user can use Spectrum Analyzer to scan the spectrum. However, the Monitor user can only view the last scanned results. •...
Tools Alternatively, use the rlt commands to run the radio link test tool through Console. Type the required rlt command and click Execute, for example “rlt -t”. To run the Radio Link Test tool through Command Line Interface (CLI), refer the ‘Reference Guide’...
Page 47
Tools If Stop button is clicked during the test procedure, the test continues running for Test Duration (until the current testing is done), and stops thereafter. After the test procedure, the default configuration is restored without any link failure. It is recommended to Disable ACS on BSU and Enable ACS on SU, before the test procedure.
Click RLT Output to see the following table. 6.4 Console Commands The Console Commands feature helps Proxim Technical Support team to debug field issues. 6.5 Wireless Site Survey This feature scans all the available channels according to the current Channel Bandwidth and collects information about all BSU or End point A configured with the same network name as SU or End Point B.
Tools 6.6 sFlow® Proxim point-to-multipoint and point-to-point devices support sFlow® technology, developed by InMon Corporation. The sFlow® technology provides the ability to measure network traffic on all interfaces simultaneously by collecting, storing, and analyzing traffic data. Depicted below is the sFlow architecture that consists of a sFlow Agent and a sFlow Receiver.
Page 50
Tools sFlow Receiver Configuration The Receiver Configuration page allows you to configure sFlow Receiver(s), which receives samples from all agents on the network, combines and analyzes the samples to produce a report of network activity. To configure sFlow Receiver do the following: •...
Page 51
Tools • Enabling sFlow packet sampling effects the system performance, and hence care must be taken when choosing the right value for Packet Sampling Rate and Maximum Header Size. • Receiver Index for packet Sampling table and Counter Polling table should be same for each Ethernet interface. Counter Polling Configuration To configure and start Counter Polling sampling, do the following: 1.
Bootloader CLI and ScanTool The Bootloader CLI is a minimal subset of the normal CLI that is used to perform initial configuration of the device. The Bootloader CLI is available when the device embedded software is not running. This interface is only accessible through the serial interface, and used when: •...
Page 72
A Bootloader CLI and ScanTool 2. Run the BOOTP and TFTP Servers followed by device reboot When the device reboots, the device gets the IP Address and Boot filename from the BOOTP server. You need not change any of the default Bootloader parameters. After BOOTP succeeds, the device initiates a TFTP request with the filename it gets from BOOTP.
Page 73
A Bootloader CLI and ScanTool Reset/Reload Procedure using ScanTool For detailed Reset/Reload procedure using ScanTool refer ScanTool Guide available at http://support.proxim.com. Device Management Guide...
Parameters Requiring Reboot Given below are the parameters that require the device to reboot. Parameter(s) Web Page(s) Applicable Device Mode* System Configuration Network Mode ADVANCED CONFIGURATION -> System Maximum MTU ADVANCED CONFIGURATION -> System Controller Status ADVANCED CONFIGURATION -> System All devices in Bridge Mode Tunneling Status...
For Warranty and Technical Support Policy, please visit 10.1 Obtaining Technical Service and Support If you are having trouble using the Proxim product, and require additional support to resolve your issue, please be ready to provide the following information before you contact the Proxim Technical Support team: •...
Business Hours: 24x7 live response. Tier 3 support: 8 a.m. to 5 p.m. M-F PDT (UTC/GMT -7 hrs) ServPak Support To provide even greater investment protection, Proxim Wireless offers a cost-effective support program called ServPak. ServPak is a program of enhanced service support options that can be purchased as a bundle or individually, tailored to meet your specific needs.
Page 79
Advanced Technical Support In addition to the Proxim Tier 1 technical support, customers will be able to have their more complex issues escalated to our Tier 3 technical support engineers. Our Tier 3 engineers will review specific configurations to troubleshoot intricate issues and will also provide helpful insights regarding Proxim products and various tips from decades of collective experience in the wireless industry.
Glossary Auto Channel Selection (ACS) ACS scans all the available channels and chooses a low interference channel to establish a connection. Bridge An interface connecting a local area network to another local area network that uses the same protocol (for example, wireless, Ethernet or token ring). Wireless bridges are commonly used to link buildings in campuses.
Page 81
Hypertext Transfer Protocol (HTTP) is the protocol to transport Web pages. When you access the Internet with your browser, the HTTP protocol is used for data transport (http://www.proxim.com). When you access the unit by using the Web Interface, HTTP is used to transport the information. HTTPS is the Secure Hypertext Transfer Protocol.
Page 82
D Glossary License File A license file is used to enable certain features of the unit. The unit already has a license file when it is shipped. When more features become available, you can purchase a license file and download it to the unit to enable these additional features.
Page 83
A router uses a dynamic routing protocol like RIP or static routes to base its forwarding decision on. ScanTool A Proxim tool which works from PC or laptop to discover or change the IP addresses of Proxim devices connected to the local network. Simple Network Management Protocol...
Page 84
D Glossary Subnet Mask/Network Mask A subnet mask is a bit mask that defines which part of an IP address is used for the network part and which part for a host (computer) number. A subnet mask is like an IP address represented by four numbers in the range 0 - 255 separated by dots.
Page 85
D Glossary VLAN The Virtual Local Area Network (VLAN) feature helps in logical grouping of network host on different physical LAN segments, which can communicate with each other as if they are all on the same physical LAN segment. The Wired Equivalent Privacy (WEP) algorithm is the standard encryption method used to protect wireless communication from eavesdropping.