Aprisa SR+ User Manual 1.11.1 English
Aprisa SR+ User Manual 1.11.1 English
Aprisa SR+ User Manual 1.11.1 English
Version 1.11.1b
| 3
Copyright
Copyright © 2021 4RF Limited. All rights reserved.
This document is protected by copyright belonging to 4RF Limited and may not be reproduced or republished
in whole or part in any form without the prior written permission of 4RF Limited.
Trademarks
Aprisa and the 4RF logo are trademarks of 4RF Limited.
Windows is a registered trademark of Microsoft Corporation in the United States and other countries. Java
and all Java-related trademarks are trademarks or registered trademarks of Sun Microsystems, Inc. in the
United States and other countries. All other marks are the property of their respective owners.
Disclaimer
Although every precaution has been taken preparing this information, 4RF Limited assumes no liability for
errors and omissions, or any damages resulting from use of this information. This document or the equipment
may change, without notice, in the interests of improving the product.
Compliance General
The Aprisa SR+ radio predominantly operates within frequency bands that require a site license be issued
by the radio regulatory authority with jurisdiction over the territory in which the equipment is being
operated.
It is the responsibility of the user, before operating the equipment, to ensure that where required the
appropriate license has been granted and all conditions attendant to that license have been met.
Changes or modifications not approved by the party responsible for compliance could void the user’s
authority to operate the equipment.
Equipment authorizations sought by 4RF are based on the Aprisa SR+ radio equipment being installed at a
fixed restricted access location and operated in point-to-multipoint or point-to-point mode within the
environmental profile defined by EN 300 019, Class 3.4. Operation outside these criteria may invalidate the
authorizations and / or license conditions.
The term ‘Radio’ with reference to the Aprisa SR+ User Manual, is a generic term for one end station of a
point-to-multipoint Aprisa SR+ network and does not confer any rights to connect to any public network or
to operate the equipment within any territory.
Safety EN 60950-1:2006
Class 1 division 2 for hazardous locations
When operating as a short range device, the Aprisa SR+ radio TX power can be adjusted over the range of
+10 dBm to +27 dBm (average power).
To determine the maximum power to be set on the Aprisa SR+ radio, it is necessary to take into account the
feeder loss and antenna gain.
1. ERP limit (specified in dBm, in the case of IR-2030 this is +27 dBm) ERPdBm
2. Peak to average power ratio PxdB
QPSK 3 dB
16QAM 5 dB
64QAM 6 dB
ACM 6 dB
3. Antenna gain specified in dBd (if given in dBi subtract 2.15 dB from the given value) GdBd
4. Feeder coax loss between Aprisa SR+ radio and antenna (specified in dB/m) LdB/m
5. Length of feeder coax between Aprisa SR+ radio and antenna (specified in metres) dm
From the above information, the power setting of the Aprisa SR+ radio (P dBm) can be calculated to ensure
operation within the regulatory requirements using the formula:
Radio 47CFR part 24, part 27, part 90 and part 101 Private Land
Mobile Radio Services
(note 1)
EMC 47CFR part 15 Radio Frequency Devices , EN 301
489-1 and 5
Environmental ETS 300 019 Class 3.4, IEEE 1613 Class 2
IEC 61850-3, Ingress Protection IP51
Safety UL / EN 60950-1:2006
Class 1 division 2 for hazardous locations
Note 1: This equipment has been tested and found to comply with the limits for a Class A digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against
harmful interference when the equipment is operated in a commercial environment. This equipment
generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with
the instruction manual, may cause harmful interference to radio communications. Operation of this
equipment in a residential area is likely to cause harmful interference in which case the user will be required
to correct the interference at his own expense.
Note 2: The Frequency Band is not an indication of the exact frequencies approved by FCC.
Note 3: For 700 MHz FCC Part 27 compliance in the Upper A block, the following frequency range restrictions
apply:
* The Frequency Band is not an indication of the exact frequencies approved by ISED.
This product is suitable for use in Class 1, Division 2, Groups A - D hazardous locations or non-hazardous
locations. A Nationally Recognized Testing Laboratory (NRTL) listed power supply is required to power the
equipment.
The USB service ports are not to be used unless the area is known to be non-hazardous.
Users requiring compliance to IEEE 1613 class 2 shall use screened cables and connectors to connect to the
serial ports.
Users requiring compliance to IEC 61850-3 shall use screened cables and connectors to connect to the serial
ports.
Note that during certain supply voltage dips and interruptions, the alarm status may change while the unit
is recovering from such an event.
RF Exposure Warning
WARNING:
The installer and / or user of Aprisa SR+ radios shall ensure that a separation distance
as given in the following table is maintained between the main axis of the terminal’s
antenna and the body of the user or nearby persons.
Minimum separation distances given are based on the maximum values of the following
methodologies:
1. Maximum Permissible Exposure non-occupational limit (B or general public) of
47 CFR 1.1310 and the methodology of FCC’s OST/OET Bulletin number 65.
2. Reference levels as given in Annex III, European Directive on the limitation of
exposure of the general public to electromagnetic fields (0 Hz to 300 GHz)
(1999/519/EC). These distances will ensure indirect compliance with the
requirements of EN 50385:2002.
Note 1: The Peak Envelope Power (PEP) at maximum set power level is +40 dBm.
Contents
1. Getting Started ........................................................................ 17
2. Introduction ............................................................................ 19
About This Manual ............................................................................... 19
What It Covers ............................................................................ 19
Who Should Read It ...................................................................... 19
Contact Us ................................................................................. 19
What’s in the Box ............................................................................... 20
5. Preparation ............................................................................ 73
Bench Setup ...................................................................................... 73
Path Planning .................................................................................... 74
Antenna Selection and Siting ........................................................... 74
Base or Repeater Station ......................................................... 74
Remote radio....................................................................... 75
Antenna Siting ..................................................................... 76
Coaxial Feeder Cables ................................................................... 77
Linking System Plan ...................................................................... 77
Site Requirements ............................................................................... 78
Power Supply.............................................................................. 78
Equipment Cooling ....................................................................... 78
Earthing and Lightning Protection ..................................................... 79
Feeder Earthing.................................................................... 79
Radio Earthing ..................................................................... 79
1. Getting Started
This section is an overview of the steps required to commission an Aprisa SR+ radio network in the field:
Phase 1: Pre-installation
5. Connect the coaxial jumper cable between the lightning protection and the radio Page 84
antenna port.
1. If radio’s IP address is not the default IP address (169.254.50.10 with a subnet Page 390
mask of 255.255.0.0) and you don’t know the radio’s IP address see ‘Command
Line Interface’ on page 390.
2. Connect the Ethernet cable between the radio’s Ethernet port and the PC.
3. Confirm that the PC IP settings are correct for the Ethernet connection: Page 90
• IP address
• Subnet mask
• Gateway IP address
6. Compare the actual RSSI to the expected RSSI value (from your path planning). Page 66
8. Confirm that the radio is operating correctly; the OK, MODE and AUX LEDs are
green.
2. Introduction
About This Manual
What It Covers
This user manual describes how to install and configure an Aprisa SR+ digital radio network.
It specifically documents an Aprisa SR+ radio running system software version 1.11.1 .
It is recommended that you read the relevant sections of this manual before installing or operating the
radios.
Contact Us
If you experience any difficulty installing or using Aprisa SR+ after reading this manual, please contact
Customer Support or your local 4RF representative.
The 4RF New Zealand head office is:
4RF Limited
26 Glover Street, Ngauranga
PO Box 13-506
Wellington 6032
New Zealand
E-mail [email protected]
Website www.4rf.com
Telephone +64 4 499 6000
Facsimile +64 4 473 4447
E-mail [email protected]
Website www.4rf.com
Telephone +1 866 232-5647
Product Features
Functions
• Point-to-Point (PTP) or Point-to-Multipoint (PMP) operation
• Licensed frequency bands:
VHF 135 135-175 MHz
VHF 220 215-240 MHz
UHF 320 320-400 MHz
UHF 400 400-470 MHz
UHF 450 450-520 MHz
UHF 700 757-758 MHz and 787-788 MHz
UHF 896 896-902 MHz
UHF 928 928-960 MHz
• Channel sizes – software selectable:
12.5 kHz
20 kHz
25 kHz
50 kHz
100 kHz
• Adaptive Coding and Modulation (ACM): QPSK (High Gain) to 64 QAM
• Half duplex or full duplex RF Point-To-Multipoint operation
• Full duplex RF Point-to-point operation
• Automatic Transmit Power Control (ATPC)
• Ethernet data interface and RS-232 / RS-485 asynchronous multiple port options
• Software selectable dual / single antenna port options (dual antenna port for external duplexers or
filters)
• Data encryption and authentication using 128,192 and 256 bit AES and CCM security standards
• Terminal server operation for transporting RS-232 / RS-485 traffic over IP or Ethernet and converting
IP packets to a local physical serial port
• Mirrored Bits ® and SLIP support for RS-232
• IEEE 802.1Q VLAN support with single and double VLAN tagged and add/remove VLAN manipulation
to adapt to the appropriate RTU / PLCs
• QoS supports using IEEE 802.1p VLAN priority bits to prioritize and handle the VLAN / traffic types
• QoS per port (Ethernet, serial, management)
• L2 / L3 / L4 filtering for security and avoiding narrow band radio network overload
• L3 Gateway Router mode with standard static IP route for simple routing network integration
• L3 Router mode with per Ethernet interface IP address and subnet
• L2 Bridge mode with VLAN aware for standard Industrial LAN integration
• Ethernet header and IP/TCP / UDP ROHC header compression to increase the narrow band radio
capacity
• Ethernet and serial payload compression to increase the narrow band radio capacity
• Pseudo peer to peer communication between remote radios through base-repeater or repeater
stations
• SuperVisor web management support for element and sub-network (base-repeater-remotes)
management
• SuperVisor Extended Network Management (EXM) extending SuperVisor management beyond the
single radio network providing configuration and monitoring to other Aprisa SR family products
• SNMPv1/2/3 & encryption MIB supports for 4RF SNMP manager or third party SNMP agent network
management
• SNMP context addressing for compressed SNMP access to remote radios
• SNTP for accurate wide radio network time and date
• Build-configuration / flexibility of serial and Ethernet interface ports (3+1, 2+2, 4+0)
• Radio and user interface redundancy (provided with Aprisa SR+ Protected Station)
• Protected Station fully hot swappable and monitored hot standby
• Power optimized with sleep modes
• Transparent to all common SCADA protocols; e.g. Modbus, IEC 60870-5-101/104, DNP3 or similar
• Complies with international standards, including ETSI, FCC, ISED, ACMA, EMC, safety and
environmental standards
Security
The Aprisa SR+ provides security features to implement the key recommendations for industrial control
systems. The security provided builds upon the best in class from multiple standards bodies, including:
• IEC/TR 62443 (TC65) ‘Industrial Communications Networks – Network and System Security’
• IEC/TS 62351 (TC57) ‘Power System Control and Associated Communications – Data and
Communication Security’
• FIPS PUB 197, NIST SP 800-38C, IETF RFC3394, RFC3610 and IEEE P1711/P1689/P1685
• FIPS 140-2: Security Requirements for Cryptographic Modules
Performance
• Typical deployment of 30 remote radios from one base station with a practical limit of a few hundred
remote radios
• Long distance operation
• High transmit power
• Low noise receiver
• Forward Error Correction
• Electronic tuning over the frequency band
• Thermal management for high power over a wide temperature range
Usability
• Configuration / diagnostics via front panel Management Port USB interface, Ethernet interface
• Built-in webserver SuperVisor with full configuration, diagnostics and monitoring functionality,
including remote radio configuration / diagnostics over the radio link
• LED display for on-site diagnostics
• Dedicated alarm port
• Software upgrade and diagnostic reporting via the host port USB flash drive
• Over-the-air software distribution and upgrades
• Simple installation with integrated mounting holes for wall, DIN rail and rack shelf mounting
Product Overview
Automatic Registration
On start-up, the remote radio transmits a registration message to the base station which responds with a
registration response. This allows the base station to record the details of all the remote radios active in
the network.
If a remote is not able to register with base station in 5 attempts, then a ‘Network Configuration Warning’
alarm event will be raised indicating that a remote is not registered with the base station. If a remote radio
cannot register with the base station after 30 minutes, it will automatically reboot.
If a remote radio has registered with the base station but then loses communication, it will automatically
reboot 30 minutes after the ‘Remote Communications Lost’ alarm event. If the remote communications lost
alarm is disabled, the remote will not reboot.
Remote Messaging
There are two message types in the Aprisa SR+ network, broadcast messages and unicast messages.
Broadcast messages are transmitted by the base station to the remote radios and unicast messages are
transmitted by the remote radio to the base station. These messages are commonly referred to as uplink
(unicast remote to base) and downlink (broadcast base to remote).
All remotes within the coverage area will receive broadcast messages and pass them on to either the
Ethernet or serial interface. The RTU determines if the message is intended for it and will accept it or
discard it.
Single Hop
The Aprisa SR+ functionality allows repeaters in Bridge mode to forward Ethernet packets based on Repeater
Network Segment ID. The base station translates the destination MAC address to the Repeater Network
Segment ID. This improves repeater performance by forwarding the packet if the Repeater Network Segment
ID belongs to the repeater branch and discards the packet if it doesn’t.
Router mode supports repeater packet forwarding based on IP destination address. This improves repeater
performance by forwarding the packet if the IP destination address belongs to the repeater branch and
discards the packet if it doesn’t
Multiple Hop
In any type of store and forward repeater network base, repeater and remote radios must have their Tx/Rx
frequencies sets to match to their appropriate linking devices as shown in the figures.
Note: Frequencies shown in the figures relates to the device on the left where {Tx, Rx} = {fx, fy}. In this
example, the Base Station, Repeater 2 and remotes are deployed with Tx=f1 and Rx=f2. On the other hand
Repeater 1 and Repeater 3 are deployed with Tx=f2 and Rx=f1, creating the required linking for daisy chain
operation.
Repeater Messaging
The Aprisa SR+ uses a routed protocol throughout the network whereby messages contain source and
destination addresses. The remote and repeater stations will register with a base station. In networks with
a repeater, the repeater must register with the base station before the remotes can register with the base
station.
Additionally, based on destination address, messages are designated as either a ‘broadcast’ message,
(mostly originating from a base station) or a ‘unicast’ message (mostly originating from a remote radio).
In a network with a repeater, or multiple repeaters, the base station broadcasts a message which contains
a source address and a destination address. The repeater receives the message and recognizes it as a
broadcast message, from the destination address and re-broadcasts the message across the network. In IP
routing mode all remote radios in the coverage area will receive the message but only the radio with the
destination address will act upon the message.
Similarly, the remote radio will send a unicast message which contains a unicast destination address (the
base station). The repeater will receive this message; recognize the destination address and forward it to
the appropriate destination address.
In order to prevent repeater-repeater loops, a detection mechanism of ‘duplicate message’ and use of
unicast messaging in remote to base/repeater direction is used.
For example, in the Multiple Repeater Single Hop figure above, the topology is of Base, Repeater 1, Repeater
2 and Remote 1 connected to Repeater 1 in overlapping coverage, where Remote 1 can also hear Repeater
2. When the Base station broadcasts a message, Remote1 will receive this message from both Repeater 1
and Repeater 2 but will drop one of them as ‘duplicate message’. It is possible that Repeater 1, for example,
can also hear the broadcast sent out by Repeater 2. In this case, Repeater 1 will drop this broadcast as a
‘duplicate message’.
These phenomena will not happen in the upstream direction as all messages are sent ‘unicast’. Remote 1
will send a packet to Base station, setting the destination address in packet to Base station and ‘next hop’
address in packet to Repeater 1. Thus, only Repeater 1 will forward the packet to Base station and Repeater
2 will drop the packet as the ‘next hop’ address is not Repeater 2.
To enable communication between remotes connected to a base station, or between remotes connected to
different repeater stations, the Aprisa SR+ has a special operating mode for peer to peer communication:
1. The SuperVisor > Terminal > Operating Mode > Terminal operating mode must be set to ‘Base-
Repeater’. Base-Repeater operating mode does not change the Network Radius parameter as the
base-repeater is considered to be like a regular base station.
2. IP Header Compression must be disabled on all radios (base, repeater, remotes) for this feature to
operate correctly (see ‘IP Header Compression Ratio’ on page 147).
3. The Network Repeaters Proximity must be set to ‘Base Repeater’ on all remote radios for this feature
to operate correctly (see ‘Network Repeaters Proximity’ on page 114).
4. Note: In ‘Router Mode’ setup a static route for any required peer to peer path.
If communication is required between remotes connected on the same repeater, implement the steps below.
If Base-Repeater mode is also enabled, this can still be helpful to reduce latency for messages between
remotes on the same repeater.
1. The remote radios participating in peer to peer communication must set the SuperVisor > Radio >
Channel Setup > Packet Filtering to Disable. This means that when this remote receives a packet
from another remote, it is processed and not discarded.
2. The repeater radio participating in peer to peer communication must also set the SuperVisor > Radio
> Channel Setup > Packet Filtering to Disable. This ensures that this repeater will guarantee packets
repeater from a remote will get delivered to all other remotes connected to it.
The following example depicts peer to peer communication between remote radios via a base-repeater and
via a repeater station where remote-1 and remote-2 communicate with each other via the base-repeater
station and remote-3 and remote-4 communicate with each other via the repeater station. The repeater,
remote-3 and remote-4 radios are configured with packet filtering disabled and all radios in the network
are configured with IP header compression ratio disabled.
Note: The Aprisa SR+ network is transparent to the protocol being transmitted; therefore, the Packet
Filtering parameter is based on the Aprisa SR+ addressing and network protocols, not the user (SCADA, etc.)
traffic protocols.
Architecture
The Aprisa SR+ Architecture is based around a layered TCP/IP protocol stack:
• Physical
Proprietary wireless
RS-232 and Ethernet interfaces
• Link
Proprietary wireless (channel access, ARQ, segmentation)
VLAN aware Ethernet bridge
• Network
Standard IP
Proprietary automatic radio routing table population algorithm
• Transport
TCP, UDP
• Application
HTTPS web management access through base station with proprietary management application
software including management of remote radios over the radio link
SNMPv1/2/3 for network management application software
Product Operation
There are three components to the wireless interface: the Physical Layer (PHY), the Data Link Layer (DLL)
and the Network Layer. These three layers are required to transport data across the wireless channel in the
Point-to-Multipoint (PMP) configuration. The Aprisa SR+ DLL is largely based on the 802.15.4 Media Access
Control (MAC) layer using a proprietary implementation.
Physical Layer
The Aprisa SR+ PHY uses a one or two frequency half duplex transmission mode which eliminates the need
for a duplexer. However, a Dual Antenna port option is available for separate transmit and receive antenna
connection to support external duplexers or filters (half duplex operation).
Remote nodes are predominantly in receive mode with only sporadic bursts of transmit data. This reduces
power consumption.
The Aprisa SR+ is a packet-based radio. Data is sent over the wireless channel in discrete packets / frames,
separated in time. The PHY demodulates data within these packets with coherent detection.
The Aprisa SR+ PHY provides carrier, symbol and frame synchronization predominantly through the use of
preambles. This preamble prefixes all packets sent over the wireless channel which enables fast
Synchronization.
Channel Access
The Aprisa SR+ radio has two modes of channel access, Access Request and Listen Before Send.
Option Function
Access Request Channel access scheme where the base stations controls the
communication on the channel. Remotes ask for access to the
channel, and the base station grants access if the channel is not
occupied.
Listen Before Send Channel access scheme where network elements listen to ensure
the channel is clear, before trying to access the channel.
Access Request
This scheme is particularly suited to digital SCADA systems where all data flows through the base station.
In this case it is important that the base station has contention-free access as it is involved in every
transaction. The channel access scheme assigns the base station as the channel access arbitrator and
therefore inherently it has contention-free access to the channel. This means that there is no possibility of
contention on data originating from the base station. As all data flows to or from the base station, this
significantly improves the robustness of the system.
All data messages are controlled via the AG (access grant) control message and therefore there is no
possibility of contention on the actual end user data. If a remote radio accesses the channel, the only
contention risk is on the AR (access request) control message. These control messages are designed to be
as short as possible and therefore the risk of collision of these control messages is significantly reduced.
Should collisions occur these are resolved using a random back off and retry mechanism.
As the base station controls all data transactions multiple applications can be effectively handled, including
a mixture of polling and report by exception.
• Maximum FEC coding results in the highest system gain, the best coverage but the least capacity
• Minimum FEC coding results in lower system gain, lower coverage but higher capacity
• No FEC coding results in the lowest system gain, the lowest coverage but the highest capacity
Network Layer
Packet Routing
Aprisa SR+ is a standard static IP router which routes and forwards IP packet based on standard IP address
and routing table decisions.
Aprisa SR+ router mode (see figure below), enables the routing of IP packets within the Aprisa SR+ wireless
network and in and out to the external router / IP RTUs devices connected to the Aprisa SR+ wired Ethernet
ports.
Within the Aprisa SR+ Router mode, each incoming Ethernet packet on the Ethernet port is stripped from
its Ethernet header to reveal the IP packet and to route the IP packet based on its routing table. If the
destination IP address is one of the RTUs, the packet is then forwarded to the wireless ports and broadcasted
as a PMP wireless packet to all the repeater / remotes stations. The appropriate remote then routes the IP
packet and forwards it based on its routing table to the appropriate Ethernet port, encapsulating the
appropriate next hop MAC header and forwarding it to the RTU. The RTU can then interpret and process the
IP data and communication is established between the RTU and the initiating communication device.
Static IP Router
The Aprisa SR+ works in the point-to-multipoint (PMP) network as a standard static IP router with the
Ethernet and wireless / radio as interfaces and serial ports using terminal server as a virtual interface.
The Aprisa SR+ static router is semi-automated operation, where the routing table is automatically created
in the base station and populated with routes to all remotes and repeater stations in the network during the
registration process and vice versa, where the routing table is automatically created in remote and repeater
stations and populated with routes to base station during the registration process. Updates occur when
remote is disconnected from network for any reason, with the routing table updated in a controlled fashion.
Also, in decommission operation, the base station routing tables are completely flushed allowing an
automatic rebuild. This avoids the user manually inserting / removing of multiple static routes to build /
change the routes in the network which might be tedious and introduce significant human error. The Aprisa
SR+ works as a static IP router without using any routing protocol and therefore does not have the overhead
of a routing protocol for better utilization of the narrow bandwidth network.
In addition to the semi-automated routes, the user can manually add / remove routes in the routing table
for the radio interface, Ethernet Interface and for routers which are connected to the radio network.
The Aprisa SR+ base station is used as a gateway to other networks. Thus, a configurable IP address default
gateway can be set using a static route in the routing table with a destination IP address of the destination
network address. It is recommended to use a real network IP address (actual device IP) for the gateway and
not 0.0.0.0.
The Aprisa SR+ sub-netting rules distinguish between the wireless interface and the remote Ethernet
interface where RTUs are connected. The entire wireless network is set on a single IP subnet, while each
Aprisa SR+ remote’s Ethernet interface is set to a different subnet network. In this way, the user can easily
distinguish between the remotes subnet IP addresses.
Since the Aprisa SR+ network should be considered as a router where the network Ethernet interface is the
‘router port’, the network configuration for setting the static routes or the default gateway IP addresses is
described in the follow figure:
Thus, the static route setting for router R2 at the Aprisa SR+ base station and remote radio will be:
Note: The radio network (base station and remote radios) will automatically build routes to the attached
device e.g. SCADA Master station or attached router e.g. router R1 so static routes are not required for
these devices.
Advanced Gateway Router Mode (AGRM) and Advanced Router Mode (ARM)
The Advanced Gateway Router Mode (AGRM) or Advanced Router Mode (ARM) are enabled when either
Router or a Gateway Router modes are selected and the Advanced checkbox is ticked (see ‘Terminal >
Operating Mode’ on page 119).
Advanced Gateway Router mode (AGRM) or Advanced Router mode (ARM) act like a true router between the
Ethernet ports and the RF interface port where the next hop is either an Ethernet port or an RF port (in the
non-advanced option the next hop is the Ethernet interface of the next hop radio and the RF interface are
for internal use). This means that the RF Interface of the radio also becomes a public interface, so the user
should be able to use this interface just like any other Ethernet interface.
In AGRM, all Ethernet ports have the same IP address and subnet and in ARM, each Ethernet interface has a
different IP address and subnet. In addition, the advanced option supports a new mix between AGRM / ARM
and Bridge Mode in a radio network. The following mix of [Base Station] - [Repeater / Remote] networks
are supported:
• AGRM / ARM - Bridge network i.e. base station AGRM / ARM and repeater and remote radios in
Bridge mode.
• Bridge - AGRM / ARM network i.e. base station in Bridge mode and repeater and remote radios are
in AGRM / ARM, where each node in the network can act as independent router without depending
on other nodes in the network.
• Bridge - Mix [AGRM / ARM and Bridge] network i.e. base station in Bridge mode and remotes are a
mix of Bridge and AGRM / ARM.
• AGRM / ARM - Mix [AGRM / ARM and Bridge] network i.e. base station in AGRM / ARM and remotes
are a mix of Bridge and AGRM / ARM.
• AGRM / ARM – AGRM / ARM network i.e. base station in AGRM / ARM and repeater and remote radios
are also in AGRM / ARM.
The last option is a fully routed network where it is recommended to use the standard router modes to
benefit from the radio port auto IP assignment and auto static route build for all associated devices
connected to the radio network.
Note: A mix between advanced router modes and standard router modes in the network is prohibited and
will raise a ‘network configuration warning’ alarm. If a user wants to build a full routed network, use the
standard router modes for the base station, repeater and remote radios.
The following figures are examples of the currently supported networks as described above.
The above figure describes a mixed radio mode network (AGRM-Bridge) where base station is in Advanced
Gateway Router Mode (AGRM) and the remote radios are in bridge mode (where the base station is AGRM /
ARM and all remotes must be in the same bridge mode). RTUs must set their default gateway to 10.10.1.1
which is RF IP Address of base station to reach the SCADA master.
The above figure describes a mixed radio mode network (Bridge-AGRM) where the base station is in Bridge
Mode and remote radios are in AGRM. To reach RTU-3 (10.10.1.11), the external router must use a next hop
gateway of 192.168.1.4 which is RF Interface address of Remote-2.
The above figure describes a mixed radio mode network (Bridge-Mix [AGRM and Bridge]) where the base
station is in Bridge Mode and remote radios are a mix of AGRM and Bridge mode. To reach RTU-2 (10.10.1.3),
the external router must use a next hop gateway of 192.168.1.3 which is RF Interface address of Remote-1.
To reach RTU-3 (192.168.1.5), the external router can send the traffic directly on the bridge subnet
192.168.1.x/24 network.
The above figure describes a mixed radio mode network (ARM-Bridge) where base station is in Advanced
Router Mode (ARM) and remote radios are in bridge mode. It’s the same case as the AGRM-Bridge network
above, but each Ethernet interface has a different IP address and subnet at the ARM base station.
The following functions supported in AGRM / ARM is the differences between Advanced Router Mode options
(AGRM / ARM) and standard Router Mode options Gateway Router Mode (GRM) / Router Mode (RM), such as
AGRM vs GRM and/or ARM vs RM:
• The radio interface IP Address (RF IP Address) is associated with Ethernet MAC Address so it can be
addressed like any other Ethernet Interface. The radio interface IP address will ARP respond to ARP
request with his MAC address.
• The radio interface IP address can be used for radio management functions such as SNMP, ICMP and
SNTP.
• External routers can use radio interface IP address as next hop / default gateway.
• The radio Interface IP address can be used as the ‘Local IP Address’ in terminal server.
• Auto assignment of radio interface IP address is done in a routed network of Router Mode (RM) and
Gateway Router Mode (GRM) but not in AGRM / ARM. In AGRM / ARM the radio interface IP address
is manually configured.
• Changes to the radio Interface IP address will be included in the remote registration or re-
registration with base station, respectively.
• Both units in a protected station will share the radio Interface IP address and a protection switch
will result in new active unit sending out a gratuitous ARP to advertise its ownership of radio
Interface IP address.
• AGRM / ARM allows a mix with Bridge mode, so a AGRM / ARM-Bridge or Bridge-AGRM / ARM or a
Bridge-Mix [AGRM / ARM and Bridge] network can be created. A network configuration warning alarm
will be raised on base station if this condition is not met.
• The ARP table will report a radio interface IP address if any address is learned on this interface.
Advanced Gateway Router (AGRM) or Advanced Router Mode (ARM) Static Route – Example
The purpose of this example is to determine the static route setting for router R2 in the base station and
remote radio in the following AGRM-Bridge, Bridge-AGRM networks.
In the above figure, the static route setting for router R2 at the base radio AGRM will be:
In the above figure, the static route setting for router R2 at the remote radio AGRM will be:
In the above figure, the static route setting for router R2 at the Base Station AGRM will be:
Note: In AGRM / ARM - AGRM / ARM network scenario, automatic route build of the radio network is currently
not supported. Auto route build for the associated devices to the radio network (i.e. next hop devices) is
only supported in the standard router modes where the base station, repeater and remote radios are all in
standard router modes.
The following figure describes the Public (external) / Private (internal) IP domains in Bridge-AGRM / ARM
network. The NAT IP domains splits at the NAT function enabled device, the AGRM remote radios.
NAT alarms are supported for any invalid configuration settings, including improper translation entries,
invalid timeout, along with any incompatibilities with other feature settings will cause a ‘configuration not
supported’ alarm.
As shown in the figure of Bridge-AGRM network above, IP addresses used in one NAT internal domain can be
reused by any other NAT internal domain. In the example figure above, RTUs connected to AGRM remote-1
and remote-2 reusing the same IP addresses space i.e. in this case all RTUs can have the same IP addresses
space per remote radio.
NAT router radio will respond to inbound ARP requests for IP addresses in public range as define in Address
Map Table with the MAC address of the public interface. Outbound ARP request for private IP range will ARP
respond with MAC address of the NAT radio private/local interface.
In a protected station, all NAT configurations are shared between both the active and standby radios. The
standby radio will not perform any NAT translation and routing. After a protection switch-over, NAT session
table will be aged. For smooth protection switching and continuous traffic flow, the protected station
automatically supports MAC address cloning for both active and standby radios NAT public interface (the
cloned MAC address is presented at ‘Maintenance > Advanced’ page in ‘RF Mac Address’ field).
The configured NAT Address Map Table of remote-1 shows that NAT will translate public interface RF port
IP address range 192.168.2.4 - 5 to private IP address range 10.10.1.2 – 3. NAT Address Map Table of remote-
2 shows reuse of the same private IP address range where NAT will translate public IP address range
192.168.2.7 - 8 to private IP address range 10.10.1.2 – 3.
The NAT session table of remote-1 session ID #1 shows that the public interface RF port address can’t be
used in the NAT function or in NAT Address Map Table configuration as it is reserved for the radio access
(e.g. management access, etc). This line is just for explanation purposes as in SuperVisor it will not be
shown in NAT session table since no NAT translation is made as it’s not part of the Address Map Table
configuration table.
Session ID #2 and #3 shows the inbound and outbound session translation when the SCADA master accesses
RTU-1 and vice versa. From the SCADA master perspective, RTU-1 public address is 192.168.2.4 (as it doesn’t
know the real address 10.10.1.2 of RTU-1 which is ‘hidden’ behind the NAT). As explained above, SuperVisor
will not show session ID #2 and #3 in one line as these inbound / outbound transactions are considered as
one session.
NAT translates the inbound session public RF port destination IP 192.168.2.4 to 10.10.1.2 on Eth port, the
real private IP destination of RTU-1. The source address of SCADA master 172.16.1.1 remains unchanged
during the inbound NAT translation as shown in session ID#2.
Outbound session #3 shows the response of RTU-1 to SCADA master and NAT translation of Eth port private
source address 10.10.1.2 to 192.168.2.4 on RF port public source address. The destination address of SCADA
master 172.16.1.1 remains unchanged during the outbound NAT translation.
1 In 172.16.1.1 192.168.2.2 PPP 80 Any N/A N/A N/A N/A Management > Base
2 In 172.16.1.1 192.168.2.2 XYZ 8081 Any 172.16.1.1 10.10.1.1 XYZ 80 Management >
Remote-1
3 Out 192.168.2.2 172.16.1.1 8081 XYZ Any 10.10.1.1 172.16.1.1 80 XYZ Remote-1 >
Management
4 In 172.16.1.1 192.168.2.2 XXX 10003 Any 172.16.1.1 10.10.1.3 XXX 502 SCADA > RTU-1
(Modbus)
5 Out 192.168.2.2 172.16.1.1 10003 XXX Any 10.10.1.3 172.16.1.1 502 XXX RTU-1 (Modbus) >
SCADA
6 In 172.16.1.1 192.168.2.2 FFF 20000 Any N/A N/A N/A N/A To Base CPU (and drop)
7 Out 192.168.2.2 172.16.1.1 10003 RRR Any 10.10.1.3 172.16.1.1 502 RRR RBE RTU-1 > SCADA
8 Out 192.168.2.2 172.16.1.1 NNN 23 Any 10.10.1.3 172.16.1.1 ZZZ 23 RTU-1 (Telnet) >
SCADA
9 In 172.16.1.1 192.168.2.2 23 NNN Any 172.16.1.1 10.10.1.3 23 ZZZ To Base CPU (and drop)
10 In 172.16.1.1 192.168.2.2 N/A 102 ICMP 172.16.1.1 10.10.1.1 N/A 200 Ping (Req.) > Remote-2
11 Out 192.168.2.2 172.16.1.1 102 N/A ICMP 10.10.1.1 172.16.1.1 200 N/A Remote-2 > Ping
(Resp.)
The configured NAT Address Map Table of the Base Station shows that Port Forwarding NAT will translate;
NAT Address Map Table Line 1 configuration will translate public interface Eth-1 IP address 192.168.2.2 port
range 8081 - 8087 to private IP address range 10.10.1.1 – 7 and port 80.
NAT Address Map Table Line 2 configuration will translate public IP address 192.168.2.2 port range 10,003 –
10,006 to private IP address range 10.10.1.3 – 6 and port 502 (Modbus).
NAT Address Map Table Line 3 configuration will translate ping messages public IP address 192.168.2.2 ping
query ID 101 – 107 to private IP address range 10.10.1.1 – 7 and ping query ID 200.
The NAT session table of Base Station session ID #1 shows that the public interface Eth-1 IP address and
TCP/UDP port 80 can’t be used in the NAT function or in NAT Address Map Table configuration as it is
reserved for the radio access (e.g. management access, etc). This line is just for explanation purposes as in
SuperVisor it will not be shown in NAT session table since no NAT translation is made and it’s not part of the
Address Map Table configuration table.
Session ID #2 and #3 shows the inbound and outbound session translation when the Management accesses
remote-1 using HTTP (port 80) and vice versa. From the Management perspective, remote-1 public address
is 192.168.2.2 and port 8081 (as it doesn’t know the real address 10.10.1.1 which is ‘hidden’ behind the
NAT). As explained above, SuperVisor will not show session ID #2 and #3 in separate lines as these inbound
/ outbound transactions are considered as one session.
Session ID #4 and #5, are the same as sessions ID #2 and #3 and supported by NAT Address Map Table
configuration ID #2.
Session ID #6 shows that an inbound session will drop packets if the session configuration is not supported
in the NAT Address Map Table, or there is no outbound session initiated that can support a response of an
inbound session (even if not in Address Map Table).
Session ID #7 and #8 are session initiated outbound sessions like RTU-1 RBE (Report by Exception) and Telnet
session initiated from RTU-1, respectively. Initiated outbound sessions will be either translated per reverse
Address Map Table configuration and if no configuration rule exists, then it will be built dynamically by the
NAT function to later support a response from inbound session. Inbound session ID #9 is an example of a
response to initiated outbound session ID #8, which is a dynamically created NAT translation table/session.
Session ID #10 and #11, are the same as sessions ID #2 and #3 and supported by NAT Address Map Table
configuration ID #3, but this rule is set for ICMP ping. Instead of TCP/UDP port, NAT uses the ping query ID
for translation. To run a ping across port forwarding NAT, user can use the hrPing.exe utility (run as admin)
that can control the ping query ID value. Standard Windows ping command doesn’t have the capability to
control the ping query ID value.
The following are examples of Terminal Server and IP Terminal Server in a bridge network;
The Aprisa SR+ supports mechanisms to prevent narrowband radio network overload:
1. L3/L4 Filtering
The L3 filtering can be used to block undesired traffic from being transferred on the narrow band channel,
occupying the channel and risking the SCADA critical traffic. L3/4 filtering has the ability to block a known
IP address and applications using TCP/IP or UDP/IP protocols with multiple filtering rules. The L3 (/L4) filter
can block/forward (discard/process) a specific IP address and a range of IP addresses. Each IP addressing
filtering rule set can also be set to filter a L4 TCP or UDP port/s which in most cases relates to specific
applications as per IANA official and unofficial well-known ports. For example, filter and block E-mail SMTP
or TFTP protocol as undesired traffic over the SCADA network. The user can block a specific or range of IP
port addresses, examples SMTP (Simple Mail Transfer Protocol) TCP port 25 or TFTP (Simple Trivial File
Transfer Protocol) UDP port 69.
2. L2 Address Filtering
L2 Filtering (Bridge Mode) provides the ability to filter radio link traffic based on specified Layer 2 MAC
addresses. Destination MAC (DA) addresses and a Source MAC (SA) addresses and protocol type (ARP, VLAN,
IPv4, IPv6 or Any type) that meet the filtering criteria will be transmitted over the radio link. Traffic that
does not meet the filtering criteria will not be transmitted over the radio link.
5. Ethernet Data and Management Priority and Background Bulk Data Transfer Rate
Alternatively, to VLAN priority, users can control the Ethernet traffic priority (vs serial), management
priority and rate in order to control the traffic load of the radio network, where important and high priority
data (SCADA) will pass-through first assuring SCADA network operation. The user can set the use of the
Ethernet Data Priority, which controls the priority of the Ethernet customer traffic relative to the serial
customer traffic and can be set to one of the four queues. The Ethernet Management Priority controls the
priority of the Ethernet management traffic relative to Ethernet customer traffic and can be set to one of
the four queues. The Background Bulk Data Transfer Rate sets the data transfer rate (high, medium, low)
for large amounts of management data.
Interfaces
Antenna Interface
• 2 x TNC, 50 ohm, female connectors
Single or dual antenna ports (with or without the use of external duplexer / filter)
Ethernet Interface
• 2, 3 or 4 ports 10/100 base-T Ethernet layer 2 switch using RJ45
Used for Ethernet user traffic and radio sub-network management.
USB Interfaces
• 1 x Management port using USB micro type B connector
Used for product configuration with the Command Line Interface (CLI).
• 1 x Host port using USB standard type A connector
Used for software upgrade, diagnostic reporting and configuration save / restore.
Protect Interface
• 1x Protect interface port
Used for the Protected Station operation.
Alarms Interface
• 1x Alarm port using RJ45 connector
Used to provide 2 x hardware alarm inputs and 2 x hardware alarm outputs
Example; 2 Ethernet ports and 2 RS-232 serial ports - see ‘Data Interface Ports’ on page 401 for the other
interface port options.
All connections to the radio are made on the front panel. The functions of the connectors are (from left to
right):
Designator Description
10 - 30 VDC; 3A +10 to +30 VDC (negative ground) DC power input using Molex 2 pin male screw
fitting connector.
AC/DC and DC/DC power supplies are available as accessories. See ‘External
Power Supplies’ on page 85.
ETHERNET 1 & 2 Integrated 10Base-T/100Base-TX layer-3 Ethernet switch using RJ45 connectors.
Used for Ethernet user traffic and product management.
See ‘Ethernet > Port Setup’ on page 169.
SERIAL 1 & 2 Two ports of RS-232 serial using RJ45 connectors.
Used for RS-232 asynchronous user traffic.
See ‘Serial > Port Setup’ on page 151.
Host Port using a USB standard type A connector.
Used for software upgrade and diagnostic reporting and optional: 1x RS-232
asynchronous port with USB to RS-232 converter.
See ‘Software Upgrade’ on page 441 and ‘Maintenance > General’ on page 261.
Also used to access the radio Command Line Interface (CLI). A USB converter to
RS-232 convertor will be required to connect to a PC.
ALARM Alarm Port using a RJ45 connector.
Used for two alarm inputs and two alarm outputs.
See ‘Hardware Alarms Interface’ on page 485.
MGMT Management Port using a USB micro type B connector.
Used to access the radio Command Line Interface (CLI).
See ‘Connecting to the CLI via the Management Port’ on page 390.
PROTECT Protect port. Used for Protected Station operation.
TX / ANT TNC, 50 ohm, female connector for connection of antenna feeder cable for half
duplex RF operation or the Transmit connection to an external duplexer for full
duplex RF operation or to an external filter.
See ‘Coaxial Feeder Cables’ on page 77.
RX TNC, 50 ohm, female connector for the Receive connection to an external
duplexer for full duplex RF operation or to an external filter.
Normal Operation
In normal radio operation, the LEDs indicate the following conditions:
OK MODE AUX TX RX
Management
Diagnostics traffic on the
Flashing Function Active USB MGMT port
Orange OTA software or receive
distribution invalid position
from GPS
Device detect on
Alarm present
Solid the USB host
with Warning
Orange port
Severity
(momentary)
Tx / Rx Data on
Software Stand-by radio in the USB host
Flashing RF path TX is RF path RX is
Upgrade protected port or receive
Green active active
Successful station valid position
from GPS
Test Mode
Remote radio and repeater station radios have a Test Mode which presents a real time visual display of the
RSSI on the LED Display panel. This can be used to adjust the antenna for optimum signal strength (see
‘Maintenance > Test Mode’ on page 263 for Test Mode options).
To enter Test Mode, press and hold the TEST button on the radio LED panel until all the LEDs flash green
(about 3 - 5 seconds). The response time is variable and can be up to 5 seconds.
To exit Test Mode, press and hold the TEST button until all the LEDs flash red (about 3 – 5 seconds).
Note: Test Mode traffic has a low priority but could affect customer traffic depending on the relative
priorities setup.
The RSSI result is displayed on the LED Display panel as a combination of LED states:
Network Management
The Aprisa SR+ contains an embedded web server application (SuperVisor) to enable element management
with any major web browser (such as Mozilla Firefox or Microsoft® Internet Explorer).
SuperVisor enables operators to configure and manage the Aprisa SR+ base station radio and repeater /
remote radios over the radio link.
SuperVisor, when connected to the base station radio allows management of all radios in the network. The
Network Table displays a list of all the registered remote radios for the base station and provides
management access to each of the remote radios (see ‘Network Status > Network Table’ on page 331).
Point-To-Point Network
Point-to-Multipoint Network
Network Changes
Note: The remote radio will continue to show in the Network Table list.
5. Preparation
Bench Setup
Before installing the links in the field, it is recommended that you bench-test the links. A suggested setup
for basic bench testing is shown below:
When setting up the equipment for bench testing, note the following:
Earthing
Each radio should be earthed at all times. The radio earth point should be connected to a protection earth.
Attenuators
In a bench setup, there should be 60 - 80 dB at up to 1 GHz of 50 ohm coaxial attenuation, capable of
handling the transmit power of +37 dBm (5 W) between the radios’ antenna connectors.
Splitter
If more than two radios are required in your bench setup, a multi-way splitter is required. The diagram
shows a two way splitter. This splitter should be 50 ohm coaxial up to 1 GHz and capable of handling the
transmit power of +37 dBm (5 W).
Cables
Use double-screened coaxial cable that is suitable for use up to 1 GHz at ≈ 1 metre.
CAUTION: Do not apply signals greater than +10 dBm to the antenna connection as they can damage the
receiver.
Path Planning
The following factors should be considered to achieve optimum path planning:
• Antenna Selection and Siting
• Coaxial Cable Selection
• Linking System Plan
Factor Explanation
Frequency Often used in 380-530 MHz bands
Gain Varies with size (5 dBi to 8 dBi typical)
Wind loading Minimal
Tower aperture required Minimal
Size Range from 2 m to 3 m length
Polarization Vertical
Remote radio
There are two main types of directional antenna that are commonly used for remote radios, Yagi and corner
reflector antennas.
Yagi Antennas
Factor Explanation
Frequency Often used in 350-600 MHz bands
Gain Varies with size (typically 11 dBi to 16
dBi)
Stackable gain increase 2 Yagi antennas (+ 2.8 dB)
4 Yagi antennas (+ 5.6 dB)
Size Range from 0.6 m to 3 m in length
Front to back ratio Low (typically 18 to 20 dB)
It is possible to increase the gain of a Yagi antenna installation by placing two or more of them in a stack.
The relative position of the antennas is critical.
Factor Explanation
Frequency Often used in 330-960 MHz bands
Gain Typically 12 dBi
Size Range from 0.36 m to 0.75 m in length
Front to back ratio High (typically 30 dB)
Beamwidth Broad (up to 60°)
Antenna Siting
Wide angle and zoom photographs taken at the proposed antenna location (looking down the proposed path),
can be useful when considering the best mounting positions.
To ensure maximum performance, it is recommended that you use good quality low-loss coaxial cable for
all feeder runs. When selecting a coaxial cable consider the following:
Factor Effect
Attenuation Short cables and larger diameter cables have less attenuation
Cost Smaller diameter cables are cheaper
Ease of installation Easier with smaller diameter cables or short cables
For installations requiring long feeder cable runs, use the RFI AVA5 50, RFI LDF4 50A or RFI CNT-400 feeder
cable or equivalent:
For installations requiring short feeder cable runs, use the RFI 8223 feeder cable or equivalent:
All of the above factors combine in any proposed installation to create a Linking System Plan. The Linking
System Plan predicts how well the radios will perform after it is installed.
Use the outputs of the Linking System Plan during commissioning to confirm the radios have been installed
correctly and that it will provide reliable service.
Site Requirements
Power Supply
WARNING:
Before connecting power to the radio, ensure that the radio is grounded via the
negative terminal of the DC power connection.
Equipment Cooling
If the Aprisa SR+ is operated in an environment where the ambient temperature exceeds 50°C, the Aprisa
SR+ convection air flow over the heat sinks must be considered.
WARNING:
If the Aprisa SR+ is operated in an environment where the ambient temperature exceeds
50°C, the Aprisa SR+ must be installed within a restricted access location to prevent
human contact with the enclosure heat sink.
WARNING:
The Aprisa SR+ can be operated in an environment where the ambient temperature
exceeds 50°C. The heat sink will be a hot surface - do not touch.
WARNING:
Lightning can easily damage electronic equipment.
To avoid this risk, install primary lightning protection devices on any interfaces that
are reticulated in the local cable network.
You should also install a coaxial surge suppressor on the radio antenna port.
Feeder Earthing
Earth the antenna tower, feeders and lightning protection devices in accordance with the appropriate local
and national standards. The diagram below shows the minimum requirements.
Use grounding kits as specified or supplied by the coaxial cable manufacturer to properly ground or bond
the cable outer.
Radio Earthing
The Aprisa SR+ has an earth connection point on the top left and the top right of the enclosure. M4 8mm
pan pozi machine screws and M4 lock washers are supplied fitted to the radio. These screws can be used to
earth the enclosure to a protection earth.
Mounting
The Aprisa SR+ has four threaded holes (M4) in the enclosure base and two holes (5.2 mm) through the
enclosure for mounting.
• DIN rail mounting with the Aprisa SR+ DIN Rail Mounting Bracket
• Rack shelf mounting
• Wall mounting
• Outdoor enclosure mounting
WARNING:
If the Aprisa SR+ is operated in an environment where the ambient temperature exceeds
50°C, the Aprisa SR+ must be installed within a restricted access location to prevent
human contact with the enclosure heatsink.
Required Tools
No special tools are needed to install the radio.
The Aprisa SR+ is mounted into the DIN rail mounting bracket using the four M4 threaded holes in the Aprisa
SR+ enclosure base. Four 8 mm M4 pan pozi machine screws are supplied with the bracket.
The Aprisa SR+ DIN rail mounting bracket can be mounted in four positions on a horizontal DIN rail:
• Vertical Mount (vertical enclosure perpendicular to the mount)
• Horizontal Mount (horizontal enclosure perpendicular to the mount)
• Flat Vertical Mount (vertical enclosure parallel to the mount)
• Flat Horizontal Mount (horizontal enclosure parallel to the mount)
WARNING:
If the Aprisa SR+ is operated in an environment where the ambient temperature
exceeds 50°C, the Aprisa SR+ convection air flow over the heat sinks must be
considered.
Wall Mounting
The Aprisa SR+ can be mounted on a wall using the two holes through the enclosure (5.2 mm diameter).
Typically, M5 screws longer than 35 mm would be used.
WARNING:
When the link is operating, there is RF energy radiated from the antenna.
Do not stand in front of the antenna while the radio is operating (see the ‘RF
Exposure Warning’ on page 3).
Fit the appropriate male or female connector (usually N-type) to the antenna feeder at the antenna end.
Carefully follow the connector manufacturers’ instructions.
Securely attach the feeder cable to the mast and cable trays using cable ties or cable hangers. Follow the
cable manufacturer’s recommendations about the use of feeder clips, and their recommended spacing.
Connect the antenna and feeder cable. Weatherproof the connection with a boot, tape or other approved
method.
The Aprisa SR+ antenna connection is a TNC female connector so the feeder / jumper must be fitted with a
TNC male connector.
If a jumper is used between the feeder and the radio, connect a coaxial surge suppressor or similar lightning
protector between the feeder and jumper cables (or at the point where the cable enters the equipment
shelter). Connect the feeder cable to the antenna port on the radio.
Earth the case of the lightning protector to the site Lightning Protection Earth.
The Aprisa SR+ has an earth connection point on the top left and the top right of the enclosure. M4 8mm
pan pozi machine screws and M4 lock washers are supplied fitted to the radio. These screws can be used to
earth the enclosure to a protection earth.
The negative supply of the Aprisa SR+ power connection is internally connected to the Aprisa SR+ enclosure.
Power must be supplied from a Negative Earthed power supply.
Wire your power source to power connector and plug the connector into the radio. The connector screws
can be fastened to secure the connector.
Spare Molex 2 pin female power connectors can be ordered from 4RF:
If the LEDs fail to light, carefully check the supply polarity. If the power supply connections have been
accidentally reversed, internal fuses will have blown to protect the unit.
Spare fuses are contained within the radio, see ‘Spare Fuses’ on page 437 for instructions on how to locate
and replace the fuses.
The following external power supplies are available from 4RF as accessories:
Connecting to SuperVisor
The predominant management connection to the Aprisa SR+ radio is with an Ethernet interface using
standard IP networking. There should be only one Ethernet connection from the base station to the
management network.
The Aprisa SR+ has a factory default IP address of 169.254.50.10 with a subnet mask of 255.255.0.0. This is
an IPv4 Link Local (RFC3927) address which simplifies the connection to a PC.
Each radio in the network must be set up with a unique IP address on the same subnet.
The Aprisa SR+ Protected Station radio A (left radio) has a factory default IP address of 169.254.50.10 and
radio B (right radio) has a factory default IP address of 169.254.50.20, both with a subnet mask of
255.255.0.0.
Management PC Connection
The active management PC must only have one connection to the network as shown by path . There should
not be any alternate path that the active management PC can use via an alternate router or alternate LAN
that would allow the management traffic to be looped as shown by path .
When logging into a network, it is important to understand the relationship between the Local Radio and
the Remote Radios.
The Local Radio is the radio that your IP network is physically connected to.
If the Local Radio is a base station, SuperVisor manages the base station and all the repeater stations and
remote radios in the network.
If the Local Radio is a remote radio or repeater station, SuperVisor only manages the remote / repeater
station radio logged into.
If the user is at the remote radio and connects SuperVisor directly to the remote radio via their computer,
all relevant features are still available. This includes the ability to monitor the ‘Last received packet RSSI.
If ICMP is enabled on the base station, the user will also be able to ping the base station to confirm the
connectivity.
Windows XP example:
1. Open the ‘Control Panel’.
2. Open ‘Network Connections’ and right click on the ‘Local Area Connection’ and select ‘Properties’.
3. Click on the ‘General’ tab.
4. Click on ‘Internet Protocol (TCP/IP)’ and click on properties.
5. Enter the IP address and the subnet mask (example as shown).
6. Click ‘OK’ then close the Control Panel.
If the radio is on a different subnet from the network the PC is on, set the PC default gateway address to
the network gateway address which is the address of the router used to connect the subnets (for details,
consult your network administrator).
Login to SuperVisor
The maximum number of concurrent users that can be logged into a radio is 6.
If SuperVisor is inactive for a period defined by the Inactivity Timeout option (see ‘Maintenance > General’
on page 261), the radio will automatically logout the user.
To login to SuperVisor:
1. Open your web browser and enter the IP address of the radio.
If you haven’t assigned an IP address to the radio, use the factory default IP address of 169.254.50.10 with
a subnet mask of 255.255.0.0.
If you don’t know the IP address of the radio, you can determine it using the Command Line Interface (see
‘Command Line Interface’ on page 390).
Note: The Aprisa SR+ has a randomly generated unique self-signed ECC256 security certificate which may
cause the browser to prompt a certificate warning. It is safe to ignore the warning and continue. The valid
certificate is ‘Issued By: 4RF-APRISA’ which can be viewed in the browser.
SuperVisor will display a warning popup upon multiple consecutive failed login attempts on the same
account.
SuperVisor has login protection options which provide protection against unsuccessful login retries (see
Security > Users ‘Login Protection Mode’ on page 240). If login protection is active and a login attempt failed
due to temporary lockout of the account (Level 1 or Level 2 lockout), SuperVisor will display an ‘Account
Locked’ message.
Login
If a login attempt failed due to permanent lockout of the account (continued failed login attempts even
after levels 1 and 2 lockout periods), SuperVisor will display an ‘Account Locked’ message.
Recover
If a login attempt failed due to permanent lockout of the account or the Admin password is unknown, click
the ‘Recover’ button to start the recovery process.
If the user account is not an ADMIN account, or if the account does not have an associated ‘Standard OPT’
password entered (see ‘One-time Password Recovery’ on page 246), SuperVisor will display an error
message.
If a factory password was verified successfully during the account recover process, SuperVisor will display a
message indicating that the radio will be reset to factory defaults and rebooted.
If the submitted password for the account recovery process was invalid, SuperVisor will display a message
indicating that the recovery process has failed.
If the login is successful, the opening Terminal > Summary page will be displayed.
Important: After you login for the very first time, it is recommended that you change the default admin
password for security reasons (see ‘Security > Users’ on page 240).
If there is more than one user logged into the same radio, the Multiple Management Sessions popup will
show the usernames and IP addresses of the users. This popup message will display until 5 seconds after the
cursor is moved. The event log will also record the users logged into the radio or logged out the radio.
Logout of SuperVisor
As the maximum number of concurrent users that can be logged into a radio is 6, not logging out correctly
can restrict access to the radio until after the timeout period (30 minutes).
Logging out from a radio will logout all users logged in with the same username.
If the SuperVisor window is closed without logging out, the radio will automatically log the user out after a
timeout period of 3 minutes.
To logout of SuperVisor:
Click on the ‘Logout’ button on the Summary Bar.
Standard Radio
The following shows the components of the SuperVisor page layout for a standard radio:
The branding bar at the top of the SuperVisor frame shows the branding of SuperVisor on the left and the
product branding on the right.
The alarm bar shows the name of the radio terminal that SuperVisor is logged into (the local radio) on the
left.
If the local radio is a base station, the page shows the name of the current remote / repeater station (the
remote radio) on the right. SuperVisor will manage all the repeater stations and remote radios in the
network.
Active button; indicating the radio SuperVisor is managing a radio in this network
Active button; indicating the radio SuperVisor is managing a radio in the extended
network radio list.
If the local radio is a remote radio or repeater station, the page shows the name of the remote / repeater
station on the left. The right side of the Alarm Bar will be blank.
The LED alarm indicators reflect the status of the front panel LEDs on the radio.
Position Function
Left Busy - SuperVisor is busy retrieving data from the radio that
SuperVisor is logged into.
Ready - SuperVisor is ready to manage the radio.
Middle Displays the name of the radio terminal that SuperVisor is currently
managing.
Right The access level logged into SuperVisor. This label also doubles as
the SuperVisor logout button.
Extended Network Management (EXM) extends SuperVisor management beyond the single radio network
providing configuration and monitoring to other Aprisa SR family products down the RF path from the radio
logged into. All radios that are then managed from one login become part of the extended network radio
list.
A typical use of this new feature is where an Aprisa SRi radio network is connected to the ‘tail end’ of an
Aprisa SR+ radio network where the Aprisa SRi base station is cable connected to the Ethernet port of an
Aprisa SR+ remote radio. The connection between the Network Operations Centre (NOC) to the Aprisa SRi
base station would be via the Over-The-Air path of the Aprisa SR+ base station’s network.
Benefits Of EXM
Some of the benefits that will be seen from this enhancement include:
• Ability to use SuperVisor to manage any 4RF compatible radio units via the ‘closest radio station’
• A user can now simply establish a local connection with the closest radio and navigate to manage
another radio down the RF path from the radio logged into.
• Ability to use SuperVisor to perform ‘inverse remote management’ – i.e. to manage the base station
from any of its remote radios
• When on site at a remote location, the user can now login to the remote radio and navigate to
manage its base station
• A user can now add any IP connectable radio to a SuperVisor session and utilize the Network Status
monitoring feature to monitor radios network wide
• SuperVisor can be left running long term on the ‘Network Status > Summary’ page to have a
summarized status view of the whole monitored network
The EXM feature will not be suitable for customers who use Port forwarding NAT configuration or One to
One NAT in their existing setup.
1. Enable Network Extension Mode on all radios required in the extended network radio list including the
radio logged into, the remote radio being used to extend management, the destination base station and
any remote radios off that base station requiring management. See ‘Security > Setup’ on page 227 for
the Network Extension Mode setting.
2. Ensure that the Network ID is the same on all radios in the extended network radio list (see ‘Network
ID’ on page 113).
3. Ensure that the Key Encryption Key Type, Key Encryption Key Size and the Key Encryption Key are the
same on all radios in the extended network radio list (see ‘Security > Setup’ on page 227).
4. Click on the Network button on SuperVisor Alarm Bar (see ‘Network Status > Network Table’ on page
331).
5. In the External Access box, enter the IP address of the external radio and click the Connect button.
If this connection is successful:
• The Network Button will show the name of the radio connected to
• The LEDs next to the Network button will display the status of the radio connected to
• Clicking any top level menu after the connection is established will open the page for the radio
connected to
The Network Table shows the radio connected to. To see the complete Network Table of the radio connected
to, click the Network Table button.
SuperVisor Menu
SuperVisor Menu
The SuperVisor menu has varying access levels dependent on the login User Privileges.
The following is a list of all possible SuperVisor menu items versus user privileges:
All SuperVisor menu item descriptions assume full access ‘Admin’ user privileges:
Standard Radio
Terminal
TERMINAL SUMMARY
This page displays the current settings for the Terminal parameters. See ‘Terminal > Details’ on page 109,
‘Terminal > Device’ on page 111 and ‘Terminal > Operating Mode’ on page 119 for setting details.
OPERATING SUMMARY
Operating Mode
This parameter displays the current Operating Mode i.e. if the radio is operating as a base station, repeater
station or remote radio and the network operating mode of Bridge Mode or Router Mode.
Interface Mode
This parameter displays the Interfaces available for traffic on the radio such as Ethernet and Serial. For
Ethernet availability on the radio see ‘Maintenance > Licence’ on page 270.
Modem Mode
This parameter displays the modem mode selected e.g. ETSI / FCC etc.
TX Frequency (MHz)
This parameter displays the current Transmit Frequency in MHz.
TX Power (dBm)
This parameter displays the current Transmit Power in dBm.
RX Frequency (MHz)
This parameter displays the current Receive Frequency in MHz.
Network ID
This parameter is the network ID of this base station node and its remote / repeater stations in the network.
The entry is four alphanumeric characters.
Base Station ID
This parameter identifies the base station. All radios operating to the base station in the same network must
use the same Base Station ID setting.
It is especially important to set different values for each network when two or more networks using the
same frequencies are operating with some overlapping coverage. The entry is an integer from 1 to 8.
Node Address
The Node Address of the base station is 0000.
If the Node Address shown is FFFE, this radio is a remote radio or repeater station but has not been registered
with the base station.
The base station will automatically allocate a Node Address to all its registered repeater station and remote
radios. This address can be between 000B to 01FE.
Network Radius
This parameter displays the maximum number of hops in this network.
Inband Management
This parameter displays the status of the Inband Management option.
MANUFACTURING DETAILS
Radio Serial Number
This parameter displays the Serial Number of the radio (shown on the enclosure label).
HW Frequency Band
This parameter displays the hardware radio frequency operating range.
HW Type
This parameter displays the radio hardware type (see ’Radio Hardware Types’ on page 400).
TERMINAL DETAILS
The data entry in the next four fields can be up to 40 characters but cannot contain invalid characters. A
popup warns of the invalid characters:
GPS Coordinates
This parameter sets the GPS Coordinates for the radio location. It can be manually entered and saved or if
the radio is fitted with a GPS Receiver, it can be set by clicking on the Update GPS button. The entry is two
values of latitude and longitude comma delimited;
• The Latitude value must be a decimal number anywhere from -90 to 90
• The Longitude value must be a decimal number anywhere from -180 to 180
GPS Status
This field displays the status of the GPS Receiver if enabled (see ‘GPS Receiver’ on page 167).
The GPS Horizontal Dilution Of Precision (HDOP) information provides a GPS signal quality rating;
Controls
The Update GPS button updates the GPS Coordinates field from the installed USB GPS Receiver.
If the GPS Receiver is enabled but is not operating or not receiving a valid GPS signal, the GPS Status will
show ‘Update Failed’.
REGION SETTINGS
Time Format
This parameter sets the time format for all time based results.
The default setting is 24 Hours.
Date Format
This parameter sets the date format for date based results.
The default setting is DD/MM/YYYY.
Measurement System
This parameter sets the unit type for parameters like temperature readings.
The default setting is Metric.
RF NETWORK DETAILS
Network ID
This parameter sets the network ID of this base station node and its remote / repeater stations in the
network. The entry is four alphanumeric characters.
The default setting is CAFE.
Base Station ID
This parameter identifies the base station. All radios operating to the base station in the same network must
use the same Base Station ID setting.
It is especially important to set different values for each network when two or more networks using the
same frequencies are operating with some overlapping coverage. The entry is an integer from 1 to 8.
Network Radius
This parameter sets the maximum number of hops in this network e.g. in a network with base station,
repeater and remotes communicating via the repeater, the Network Radius should be set to 2. If the Network
Radius is set to 2, a message from that node will only pass 2 hops before it is blocked.
The default setting is 1.
When base station is configured as a ‘Base-Repeater’ (used for remote peer to peer operation via the base
station), the use of Network Radius does not change and works the same as if it were a Base Station i.e. the
Network Radius is always the number of hops from the base station to the most distant remote in the
network.
All stations in the network should be set to the same value.
Option Function
No Repeater Use when there is no repeater in the network.
Single Repeater Only Use when there is only one repeater in the network and remotes
may communicate through repeater or directly with the base
station.
Single Repeater Only (no Use this when there is only one repeater in the network and all
base remotes) remotes communicate through the repeater. This setting allows
increased performance compared with Single Repeater Only
proximity.
Overlapping Coverage Use for multiple one hop repeaters where the remote radio can see
more than one repeater or repeaters can see each other.
The communication protocol is slower because each repeater is
addressed individually and in-turn.
Separated Coverage Use for multiple one hop repeaters where the remote radio can
only see one repeater and the repeaters can’t see each other.
This option provides better network downlink performance than
the Overlapping Coverage option.
However, if the repeaters can see each other, the resultant
collisions will cause corruptions and dramatically reduce network
downlink performance.
Network Radius = 1
This parameter is set in remote radios to indicate the proximity of repeaters in the network when the
Network Radius is set to 1. All remote radios in the network must be set the same.
Option Function
No Repeater Use when there are no repeaters in the network.
Base Repeater Use when there is a base-repeater in the network.
The Network Repeaters Proximity options are dependent on the Terminal Operating Mode and the Terminal
Network Radius settings:
Inband Management
This parameter sets the Inband Management option.
If the Inband Management option is enabled, SuperVisor operating on a base station can also manage all the
remote / repeater stations in the network.
GENERAL SETTINGS
ARP Caching
This parameter enables ARP caching. The default setting is Enabled.
Option Function
Disabled ARP requests for remote devices are always sent OTA
Enabled Allows the local radio to respond to ARP requests from its own
cache instead of forwarding the request OTA
Option Function
Manual Manual entry of Date and Time
SNTP Date and Time Synchronization feature allows a radio to
synchronize its date and time from an SNTP server.
Using the SNTP feature will ensure that all radios in the network
has the same date and time required for accurate network
diagnostics.
Configure SNTP on the base station which then sends the date and
time to all the remote radios. It can be configured on a remote
radio if required but not on all remotes as SNTP requests could
overload the network.
For high availability time/date synchronization, SNTP can be
synchronized from two SNTP servers for server backup.
After selecting the offset, review the current date and time before saving the changes.
The ‘Set from Browser’ button sets the date and time directly from the browser date and time.
If the Set from Browser button is used and the offset for the browser and the radio are different, then
SuperVisor will adjust the time displayed in the text box to be the local time for the radio e.g. clicking 5pm
in Sydney (+10:00) will put 3 pm in the text box for a Perth based radio (+08:00).
Synchronization Status
This field shows the status of the current synchronization or the result of the last synchronization.
Synchronize Now
This Synchronize Now button provides manual Synchronization.
OPERATING MODES
Terminal Operating Mode
The Terminal Operating Mode can be set to Base, Base Repeater, Repeater, Remote or Point-To-Point
station. The default setting is Remote.
Option Function
Base The base station manages all traffic activity between itself,
repeaters and remotes. It is the center-point of network where in
most cases will be connected to a SCADA master.
Base Repeater The base-repeater has the same function as the base station (and
repeater station) but used when peer to peer connections between
remotes is required via the base station.
Base MMS The Base-MMS has the same function as the base station but used
when Migration Station operation is required (see Aprisa SR+ MMS
User Manual).
Repeater The repeater forwards packets coming from base station and other
repeaters e.g. in daisy chain LBS mode and /or remote radios.
Remote The remote in most cases is used as the end-point of the SCADA
network connected to an RTU or PLC device for SCADA network
control and monitoring.
Point To Point Configures a full duplex radio for Point-to-point (PTP) operation.
Changing from PMP or PTP or vice versa requires the radio to be
‘restored to factory default settings’ which will clear all previous
radio setup and configuration.
See ‘Point-To-Point’ section on page 402.
When the Terminal Operating Mode is changed from PMP to PTP or vice versa, the following popup will warn
of the ‘restore to factory default settings’.
SR Compatible
The SR Compatible option enables over-the–air point-to-multipoint interoperation between an Aprisa SR+
network and New Aprisa SR radios. The default setting is unticked.
When the Aprisa SR+ ‘SR Compatible’ option is activated, the Aprisa SR+ locks its modulation to QPSK (as
per the New Aprisa SR modulation) and disables functionality which is not available in New Aprisa SR for full
compatibility / interoperability operation.
This compatibility option allows the user a smooth migration to Aprisa SR+ when higher speeds of 120,
60 kbit/s (at 25, 12.5 kHz channel sizes), Adaptive Coding and Modulation, full duplex and more features
are required.
Note: Any mix between the New Aprisa SR and Aprisa SR+ in the network will force the whole network to
work in SR Compatible mode.
Option Function
Bridge Bridge mode inspects each incoming Ethernet frame source and
destination MAC addresses to determine if the frame is forwarded
over the radio link or discarded.
Gateway Router Gateway Router mode inspects each incoming IP source and
destination IP addresses to determine if the packet is forwarded
over the radio link or discarded. In this mode, all Ethernet
interfaces have the same IP address and subnet.
Router Router mode inspects each incoming IP source and destination IP
addresses to determine if the packet is forwarded over the radio
link or discarded. In this mode, each Ethernet interface has a
different IP address and subnet.
Advanced
Enabled for Gateway Router and Router modes only. The default setting is unticked.
To enable Advanced routing, select the operating mode; Router or Gateway Router and tick the Advanced
checkbox.
Advanced Gateway Router mode (AGRM) or Advanced Router mode (ARM) act like a true router between the
Ethernet ports and RF interface port where the next hop is one of these ports. This means that the RF
interface is a public interface exposed to the user with IP and MAC address like the Ethernet interface.
In AGRM mode, all Ethernet interfaces have the same IP address and subnet.
In ARM mode, each Ethernet interface has a different IP address and subnet.
See ‘Advanced Gateway Router Mode (AGRM) and Advanced Router Mode (ARM)’ on page 40 for a detailed
explanation of advanced router modes.
Note 1: The Network Address Translation feature works only in Advanced Router or Advanced Gateway
Router operating mode (see ‘IP > NAT’ on page 194).
RF Operating Mode
The RF Operating Mode defines the operation of the RF over-the-air. The default setting is Standard.
Option Function
Standard The radio operates normally.
Disabled Disables all RF over-the-air communications from the RF port and
turns off the transmitter and receiver to save power.
This enables a radio to be used as a Terminal Server without RF.
TERMINAL PROTECTION
Protection Type
The Protection Type defines if a radio is a stand-alone radio or part of an Aprisa SR+ Protected Station. The
default setting is None.
Option Function
None The SR+ radio is stand-alone radio (not part of an Aprisa SR+
Protected Station).
Redundant Set to make this SR+ radio part of an Aprisa SR+ Protected Station.
(Protected Station) The RF ports and interface ports from two standard Aprisa SR+
radios are switched to the standby radio if there is a failure in the
active radio.
Monitored Hot Standby Set to make this SR+ radio part of an Aprisa SR+ Protected Station.
(Protected Station) The RF ports and interface ports from two standard Aprisa SR+
radios are switched to the standby radio if there is a failure in the
active radio.
The standby radio is monitored to ensure its correct operation
should a switch-over be required. See ‘Monitored Alarms’ on page
409 for the list of monitored alarms.
Serial Data Driven Switching Set to make this SR+ radio part of an Aprisa SR+ Data Driven
Protected Station.
Protection Unit
The Protection Unit defines if this radio is the primary radio or secondary radio in a Protected Station.
One radio in the Protected Station is set to Primary and the other radio to Secondary.
It is recommended that radio A (the left radio) be configured as the Primary and that radio B (the right
radio) be configured as the Secondary. The default setting is Primary.
This menu item is only applicable if this radio is to become part of an Aprisa SR+ Protected Station.
Partner IP Address
The Partner IP Address parameter is used to set the partner IP address if this radio is to become part of a
Protected Station.
Sleep Mode is a feature of Type B Aprisa SR+ radios. This page is only visible when the radio is of Type B
hardware see ‘Radio Hardware Types’ on page 400.
Sleep Mode
The Sleep Mode parameter sets how sleep mode is controlled. The default setting is Automatic.
Option Function
Automatic If this radio is a remote, it uses the setting from the base station.
If this radio is the base station, the external triggers control the
radio sleep mode state.
Standard The external triggers control the radio sleep mode state.
ABB Totalflow ® The external trigger wakes up the radio for up to the maximum
duration set in the ‘Awake Duration’ or indefinitely if data is sent
to the RTU.
Triggers
The triggers when enabled cause the radio to sleep or wake up. For the radio to sleep, all the enabled
triggers must be OFF i.e. if only one enabled trigger goes ON, the radio will wake up.
Option Function
Disabled The Serial Port DTR has no effect on sleep mode.
Active Low (sleep when The Serial Port DTR ON state causes the radio to wake up and the
input is low) DTR OFF state allows the radio to sleep.
Note: There must be valid RS-232 signals on either the RTS or RX
lines for the radio to go to sleep (when DTR is ON).
Option Function
Disabled The Alarm Input 1 has no effect on sleep mode.
Active Low(sleep when The Alarm Input 1 high (ON) state causes the radio to wake up and
input is low) the low (OFF) state allows the radio to sleep (see ‘Alarm Inputs’ on
page 485 for alarm input specification).
Note: If the alarm input is disconnected (e.g. alarm cable
unplugged), the radio will go to sleep.
1. Connect the radio management port (MGMT) to your PC with a USB A to USB micro B cable. This will
wake a radio that is sleeping.
2. Login to the CLI. The default login is Login: ‘admin’ Password: ‘admin’
3. At the CLI prompt >> type ‘cd APRISASR-MIB-4RF’ enter
4. At the CLI prompt >> type ‘set ethPort1Enabled 1’ enter (for port 1)
The base station receiver never goes into idle mode and is always on.
When a remote radio’s receiver is in idle mode, the base station must send a series of idle exit packets
before it can send a data packet or allow a remote to send a data packet. This is to ensure that all remotes
can receive the data packet.
Radio
See ‘Radio > Radio Setup’ and ‘Radio > Channel Setup’ for setting details.
This page displays the current settings for the Channel parameters.
DATA COMPRESSION
IP Header Compression Ratio
See ‘IP Header Compression Ratio’ on page 147.
Transmit frequency, transmit power and channel size would normally be defined by a local regulatory body
and licensed to a particular user. Refer to your site license details when setting these fields.
RF CONFIGURATION
RF configuration profiles allows for two sets of TX Frequency, RX Frequency, TX Power and ATPC. The
switch-over between the two profiles can be manual controlled (see Maintenance > RF on page 268) or
automatically controlled by alarm events (see Events > Event Action Setup on page 286).
ATPC Enabled
This parameter enables the radio Automatic Transmit Power Control (ATPC). ATPC reduces the TX power to
the minimum required while still providing reliable link capacity and performance at the remote radio. ATPC
considers margins for fading and multi path to achieve high availability.
The benefits of ATPC are:
• Enhanced frequency use and reduced interference
• Input power saving
ATPC will dynamically adjust both the base station and remote station transmitter power to maximise the
frequency reuse and reduce power consumption in the network.
A remote radio transmitter will adjust its transmitter power based on the RSSI being received at the base
station. As long as the SNR being received is greater than 30dB and the RSSI is above the current set point,
then the base station will send a recommendation for the remote radio to change its transmitter power.
This recommendation is sent every minute and is based on the lowest RSSI received during this period. The
transmitter power recommendations are a minimum of +/-1dBm up to a maximum change of +/-5dBm. The
SNR limit is used to prevent interference from limiting the throughput of the system.
The RSSI set point is set per channel size to maintain enough fade margin for typical operation. If there is a
change in the RSSI level of >10dB received at the base station, then the remote radio will be instructed to
increase its level immediately and not wait the one minute. This is done to counter any fast fading or fault
conditions that would want the transmitter power to increase quickly.
The base station transmitter will adjust its transmitter power based on the lowest received RSSI and SNR
from all the remote radios in the network. The remote radios will send this information at the end of data
packets so to minimize the impact of throughput on the network. Again, if the RSSI drops by more than 10dB
then the base station will be instructed to increase its transmitter power level immediately.
ACM will continue to operate independently of ATPC. Any SNR fluctuations or packet errors will cause ACM
to change modulations.
The monitored parameter ‘Last TX Packet Forward Power’ displays the current TX power setting (see
‘Monitoring > Radio’ on page 318).
Enabled
This parameter enables the active radio RF configuration profile.
RADIO HARDWARE
The radio hardware displays the radio TX Frequency, RX Frequency and TX Power specifications.
TX and RX Frequencies.
The TX and RX frequencies entered must be within the frequency tuning range of the product frequency
band (see ‘Frequency Bands’ on page 463).
If the frequency entered is not resolvable to the synthesizer step size for the frequency band it is rejected.
For example; a 400 MHz radio has a synthesizer step size of 1.250 kHz.
The TX and RX frequencies can be single frequency half duplex or dual frequency half duplex. Dual frequency
half duplex is often used for reasons of:
• Channel Planning
• Network Efficiencies
• Regulatory rules
Important:
1. Changing the remote / repeater station frequencies will disable all management communication to the
remote / repeater stations but then by changing the base station to match the remote / repeater stations,
the radio links will be restored as will the management communication.
2. Enter the TX frequency and the RX frequency and then click ‘Save’. This is to prevent remote management
communication from being lost before both frequencies have been changed in the remote radios.
TX Power
The transmitter power is the power measured at the antenna output port when transmitting. The transmitter
power has a direct impact on the radio power consumption.
The default setting is +37 dBm.
If TX Power setting is higher than the high limit or lower than the low limit for the current modulation, an
Informational Event (55 Terminal Unit Information) will be raised to notify the user that transmit power has
been changed. This only applies to fixed modulation (not ACM).
The Peak Envelope Power (PEP) is calculated based on current configured TX power settings and modulation:
• QPSK PEP = TX Power Setting + 3 dBm
• 16 QAM PEP = TX Power Setting + 5 dBm
• 64 QAM PEP = TX Power Setting + 6 dBm
Note: The Aprisa SR+ transmitter contains power amplifier protection which allows the antenna to be
disconnected from the antenna port without product damage.
MODEM
The Radio > Radio Setup screen Modem section is different for a base / repeater / base-repeater station
and a remote radio.
Modem Mode
This parameter sets the Modem Mode in the radio. The Modem Mode option list is dependent on the radio
hardware frequency band variant (see ‘Terminal > Details’ on page 109).
Modulation Type
This parameter sets the TX Modulation Type for the radio.
Option Function
Adaptive Sets the transmit modulation to Adaptive Coding Modulation (ACM).
QPSK (High Gain) Sets the modulation to QPSK with Max Coded FEC.
QPSK (Low Gain) Sets the modulation to QPSK with Min Coded FEC.
QPSK Sets the modulation to QPSK with no FEC.
16QAM (High Gain) Sets the modulation to 16 QAM with Max Coded FEC.
16QAM (Low Gain) Sets the modulation to 16 QAM with Min Coded FEC.
16QAM Sets the modulation to 16 QAM with no FEC.
64QAM (High Gain) Sets the modulation to 64 QAM with Max Coded FEC.
64QAM (Low Gain) Sets the modulation to 64 QAM with Min Coded FEC.
64QAM Sets the modulation to 64 QAM with no FEC.
When the Modulation Type is set to Adaptive, the transmitted modulation and coding will be determined by
the signal quality of the link to the destination radio. Link quality for each radio is determined both
concurrently and independently.
The link quality used for each packet depends on the destination;
• Remote to base, remote to repeater and repeater to base uses the quality of that link only
• Unicast base to remote and base to repeater packets use the quality of that link only
• Unicast repeater to remote packets use the lowest of either the repeater-remote link or the
repeater-base link
• Broadcast base to remote, base to repeater and repeater to remote packets (serial or broadcast IP
or multicast IP) use the slowest link quality of all destinations
Adaptive Modulation is available in all Terminal Operating Modes and all Channel Access Schemes except
Listen Before Send.
ACM Control
This parameter enables / disables Adaptive Code Modulation in the receive direction.
When ACM is enabled (ACM Control set to Standard or Fast), the radio sends a modulation type
recommendation to the peer radio based on the signal quality for each individual radio.
Option Function
Disabled Disables Adaptive Code Modulation for the receive direction.
The radio does not send a modulation type recommendation to any
other radio.
Fast Enables Adaptive Code Modulation for the receive direction.
The ACM will switch down one ACM level if an errored packet is
received.
The ACM will switch up when the link quality exceeds the
performance threshold.
This option maintains the highest network speeds for as long as
possible.
Standard Enables Adaptive Code Modulation for the radio receive direction.
The ACM will switch down one ACM level if the link quality
degrades in advance of the level where errored packets would be
expected.
The ACM will switch up when the link quality exceeds the
performance threshold.
This option preserves packet integrity but reduces network speeds.
Option Function
QPSK (High Gain) Sets the modulation to QPSK with Max Coded FEC.
QPSK (Low Gain) Sets the modulation to QPSK with Min Coded FEC.
QPSK Sets the modulation to QPSK with no FEC.
16QAM (High Gain) Sets the modulation to 16 QAM with Max Coded FEC.
16QAM (Low Gain) Sets the modulation to 16 QAM with Min Coded FEC.
16QAM Sets the modulation to 16 QAM with no FEC.
64QAM (High Gain) Sets the modulation to 64 QAM with Max Coded FEC.
64QAM (Low Gain) Sets the modulation to 64 QAM with Min Coded FEC.
GENERAL
Channel Size (kHz)
This parameter sets the Channel Size for the radio (see ‘Channel Sizes’ on page 464 for Radio Capacities).
The default setting is 12.5 kHz.
Option Function
Single Antenna Select Single Antenna Single Port if using one or two frequency half
Single Port duplex transmission. The antenna is connected to the ANT port.
Single Antenna Dual Select Single Antenna Dual Port if using:
Port (duplexer) (1) One or two frequency in half duplex transmission with an external
duplexer (for filtering) connected to the ANT/TX and RX antenna ports
and single antenna connected to the duplexer.
(2) Two frequency in full duplex transmission with an external duplexer
(for full duplex operation) connected to the ANT/TX and RX antenna
ports and single antenna connected to the duplexer.
(3) Single frequency in half duplex transmission with external dual
antennas, connected to the ANT/TX and RX antenna ports.
(4) Two frequency in half or full duplex transmission with external dual
antennas, connected to the ANT/TX and RX antenna ports.
CHANNEL SETTINGS
Access Scheme
This parameter sets the Media Access Control (MAC) used by the radio for over the air communication.
Option Function
Access Request Channel access scheme where the base station controls the
communication on the channel. Remotes ask for access to the
channel, and the base station grants access if the channel is not
occupied. This mode is a general purpose access method for high
and low load networks.
Access Request (full Used on a network with full duplex base or repeater station
duplex) hardware and half duplex remotes.
A full duplex version of Access Request channel access scheme
where the base station controls the communication on the channel.
Remotes ask for access to the channel, and the base station grants
access if the channel is not occupied. If no repeaters are present,
this allows the base station to send traffic during remote
transmission and when used in a repeater network, this allows
repeaters to forward traffic while it is being received.
Listen Before Send Channel access scheme where network elements listen to ensure the
without channel is clear, before trying to access the channel. This mode is
Acknowledgement optimized for low load networks and repeated networks.
Acknowledgements are disabled.
Listen Before Send Channel access scheme where network elements listen to ensure the
with channel is clear, before trying to access the channel. This mode is
Acknowledgement optimized for low load networks and repeated networks.
With Acknowledgement, unicast requests from the remote radio are
acknowledged by the base station to ensure that the transmission
has been successful. If the remote radio does not receive an
acknowledgement, then random back-offs are used to reschedule
the next transmission.
Enabling acknowledgments increases reliability of transport but
reduces available channel capacity so if application has the
capability to handle lost or duplicate messages, the Access Scheme
should be set to Listen Before Send without Acknowledgement.
Point To Point (Half Channel access scheme for Point-to-point links using half duplex
Duplex) radios. This is the preferred access scheme for mirrored bits ®.
Packet Filtering
Each Aprisa SR+ radio can filter packets not destined for itself. The Packet Filtering parameter controls this
functionality.
Normally all packets sent by remotes and repeaters are only received at the base station. Setting packet
filtering to disabled can provide the ability for remote radios to communicate with each other (peer to peer
communication) when connected to a repeater station, particularly useful in the event of losing
communication with a SCADA Master, assuming the Aprisa SR+ network is still operational.
In a network without repeaters, this setting only affects packets from base to remote (causing IP packets
for devices at one remote to be sent out ethernet ports of all remotes with packet filtering disabled).
When repeaters exist in the network, setting this to disabled on both the repeater and its immediately
connected remotes allows devices connected to those remotes to communicate with each other and with
the repeater.
With base-repeater mode, this setting is not usually required as the base station changes the destination
from itself to broadcast when it retransmits a packet. However, if base-repeater is used in conjunction with
repeaters, then it can still be useful to disable packet filtering to reduce message latency between distant
remotes.
Note: For correct PTP link operation, the Packet Filtering parameter should not be changed from the default
setting of 'automatic'.
Note: Packet filtering will remain enabled for IP packets regardless of this setting unless IP Header
Compression is disabled (see ‘IP Header Compression Ratio’ on page 147).
Option Function
Disabled Every packet received by the radio will be forwarded to the
relevant interface.
Automatic The radio will filter (discard) packets not destined for itself
according to the Aprisa SR+ traffic protocols
Note: The Aprisa SR+ network is transparent to the protocol being transmitted; therefore the Packet
Filtering parameter is based on the Aprisa SR+ addressing and network protocols, not the user (SCADA, etc.)
traffic protocols.
Option Function
Broadcast Serial port traffic from the network is broadcast on all serial ports
on this radio. This will include the RS-232 port derived from the
USB port.
Segregate Serial port traffic from the network from a specific port number is
directed to the respective serial port only (see Segregated Port
Directions).
2E2S 2E2S
Port Number Port Number
1 1
2 2
USB USB
But if the base station and the remote radios were deployed with different Data Port product options, the
following table shows how serial port traffic is directed:
2E2S 3E1S
Port Number Port Number
1 1
2 NA
USB USB
TRAFFIC SETTINGS
Background Bulk Data Transfer Rate
This parameter sets the data transfer rate for large amounts of management data.
Option Function
High Utilizes more of the available capacity for large amounts of
management data. Highest impact on user traffic.
Medium Utilizes a moderate of the available capacity for large amounts of
management data. Medium impact on user traffic.
Low Utilizes a minimal of the available capacity for large amounts of
management data. Lowest impact on user traffic.
Option Function
User Defined Allows the user to define the channel settings (see ‘Radio >
Advanced Setup’ on page 148).
Serial Only Optimizes the channel settings for the predominantly serial traffic.
Ethernet Only Optimizes the channel settings for the predominantly Ethernet
traffic.
Mixed Optimizes the channel settings for a mix of Ethernet and serial
traffic.
DATA COMPRESSION
IP Header Compression Ratio
The IP Header Compression implements TCP/IP ROHC v2 (Robust Header Compression v2. RFC4995, RFC5225,
RFC4996) to compress the IP header. IP header compression allows for faster point-to-point transactions,
but only in a star network.
IP Header Compression module comprises of two main components, compressor and decompressor. Both
these components maintain some state information for an IP flow to achieve header compression. However,
for reasons like packet drops or station reboots this state information can go out of sync between the
compressor and decompressor resulting in compression and/or decompression failure resulting in loss of
packets.
The compression ratio controls the rate at which compressor and decompressor synchronize state
information with each other. Frequent synchronization results in reduced ratio.
Option Function
Compression Disables IP header compression.
Disabled
High State information is synchronized less frequently thus achieving
the best compression ratio.
Medium State information is synchronization more frequently than ‘High’
setting but less frequently than ‘Low’ setting.
Low State information is synchronized frequently thus reducing the
compression ratio.
This page is only visible when the Channel Setup > Network Traffic Type is set to User Defined.
In the case of serial poll SCADA networks such as MODBUS and IEC 60870.50.101, it is important to ensure
the replies from the RTU are in the correct sequence and are not timed out replies from Master requests. If
the TTL value is too long, the SCADA master will detect sequence errors.
It is recommended to use a TTL which is half the serial SCADA timeout. This is commonly called the ‘scan
timeout’ or ‘link layer time out’ or ‘retry timeout’.
Serial
Note: This screen is dependent on the Data Port product option purchased (see ‘Data Interface Ports’ on
page 401). The Data Port product option shown is a 2E2S – two Ethernet ports and two Serial ports
See ‘Serial > Port Setup’ on page 151 for configuration options.
Type
This parameter displays the Serial Port interface type.
Option Function
RS-232 Indicates that a RS-232 USB device is plugged into the radio.
RS-485 Indicates that a RS-485 USB device is plugged into the radio.
Note: This screen is dependent on the Data Port product option purchased (see ‘Data Interface Ports’ on
page 401). The Data Port product option shown is a 2E2S – two Ethernet ports and two Serial ports
Name
This parameter sets the port name which can be up to 32 characters.
Option Function
Serial Port This is the normal RS-232 serial ports provided with the RJ45
connector.
USB Serial Port This is the optional RS-232 / RS-485 serial port provided with the USB
host port connector with a USB to RS-232 / RS-485 RJ45 converter
cable (see ‘USB RS-232 / RS-485 Serial Port’ on page 434).
Mode
This parameter defines the mode of operation of the serial port. The default setting is Standard.
Option Function
Disabled The serial port is not required.
Standard The serial port is communicating with serial ports on other
stations.
Standard This mode when used with a small MTU setting provides reduced
(Streaming) latency without introducing gaps in the serial stream by taking
exclusive control of the radio channel.
Bit Oriented This mode allows support for legacy protocols that are not
compatible with standard UARTs (see ‘Bit Oriented’ on page 154).
Bit Oriented This mode allows support for legacy protocols that are not
(Streaming) compatible with standard UARTs (see ‘Bit Oriented’ on page 154).
It includes Streaming which when used with a small MTU setting
provides reduced latency without introducing gaps in the serial
stream by taking exclusive control of the radio channel.
Mirrored Bits ® Mirrored Bits® is a serial communications protocol used to
exchange internal logic status messages directly between relays
and devices used in line protection, remote control and
monitoring, relay remote tripping, sectionalizing and other such
applications. The protocol is often described as a relay-to-relay
communications technology.
Terminal Server A base station Ethernet port can communicate with both Ethernet
ports and serial ports on remote radios.
RS-232 traffic is encapsulated in IP packets (see ‘Serial > Port
Setup’ Terminal Server on page 160).
SLIP IP packets are encapsulated over RS-232 interface port (see ‘Serial
> Port Setup’ Serial Line Interface Protocol (SLIP)’ on page 163).
Parity
This parameter sets the parity to Even, Odd or None. The default setting is None.
Flow Control
This parameter sets the flow control of the serial port. The default setting is Disabled.
Option Function
None The Aprisa SR+ radio port (DCE) CTS is in a permanent ON (+ve)
state.
If radio enters sleep state, then CTE goes OFF.
CTS-RTS CTS / RTS hardware flow control between the DTE and the Aprisa
SR+ radio port (DCE) is enabled.
The CTS state follows the RTS state.
If the Aprisa SR+ buffer is full or the Aprisa SR+ is in sleep state,
the CTS goes OFF.
CTS-Keying CTS Keying is needed when working with devices that require to be
keyed before sending data;
• Driving legacy modems that use the CTS signal as a key-up
signal.
• Driving RS485 serial links, where the CTS signal is used as a Tx
enable
• Used to enable interfacing between SR+ running bit-oriented
protocol with an OSI MEU device. The CTS signal is wired to the
OSI MEU CD input in this case, as the MEU uses the CD as a
receiver enable signal in bit-oriented mode.
CTS Delay ms
In CTS-RTS mode, this parameter sets the delay between CTS and RTS. The default setting is 0 ms.
In CTS-Keying mode, this parameter sets the period the between the CTS being set and data being
transmitted. The default setting is 0 ms.
Bit Oriented
This menu item is only applicable if the serial port has an operating mode of Bit Oriented.
This mode allows support for legacy protocols that are not compatible with standard UARTs. Examples are
VANCOMM, REDAC, CONITEL, and CDC, although others will work as well.
Bit Oriented (Streaming) may be used to reduce latency of BOP. If this mode is selected, an MTU value of 8
is recommended. When streaming mode is used, other traffic is blocked during a BOP packet, so this mode
is only recommended when the radio network is used exclusively for BOP traffic.
Mirrored Bits®
This menu item is only applicable if the serial port has an operating mode of Mirrored Bits.
Introduction
Mirrored Bits® is a serial communications protocol used to exchange internal logic status messages directly
between relays and devices used in line protection, remote control and monitoring, relay remote tripping,
sectionalizing and other such applications.
The protocol relies on near constant transmission of status bytes between the devices. It can only tolerate
small delays between receipts of packets.
The protocol provides alarms states to monitor and report on radio channel performance. If a receiving
device does not receive a status packet within a predefined time then it asserts an ‘instantaneous channel
monitor’ error (ROK), this error clears as soon as the next status packet is received.
There are two more significant errors RBAD (ROK dropout for settable time) and CBAD (long term channel
unavailability exceeding a settable threshold) that will be asserted if more extensive delays occur or the
communications channel is lost.
The trigger or time period for asserting ROK varies between devices. Typically the ROK error state is asserted
if a receiving device does not receive a packet for a period > than 3 x the period taken to transmit a packet.
When optimizing for Mirrored Bits® operation the target is to present a radio channel that does not result
in ROK triggers occurring. Individual networks may be tolerant to occasional ROK alarms states if configured
to make use of the more significant alarms
Optimization
Typically Full Duplex radio communications are required however Aprisa SR+ has been optimized to support
Mirrored Bits® in a narrow channel licensed Half Duplex radio channel.
4RF has introduced a channel access scheme optimized for Mirrored Bits® support between two devices.
Error free transport of the protocol can be achieved through specific serial traffic configuration settings,
which are dependent on the radio RF configuration, Mirrored Bits® devices and network characteristics.
Under some scenarios limited Ethernet transport may be supported without impacting Mirrored Bits®
operation. If the network can tolerate occasional ROK errors Ethernet support may be increased. The level
of impact on Mirrored Bits® is related to radio settings and the specifics of the Ethernet traffic including
size and frequency of the Ethernet packets.
When attempting to configure the radios to support new devices or varying network requirements a standard
configuration is used for the radios and the following two key serial data parameters are adjusted:
• Inter-Frame Gap (IFG) – used to detect new packets on the serial input to the radio
• Maximum Transmission Unit (MTU) – used to define the over the air (OTA) packet size
To date, 4RF has lab tested and confirmed operation with the follow SEL Mirrored Bits® devices. Contact
4RF for preferred configuration:
• 2411 PAC (Programmable Automation Controller)
• 2505 series remote I/O modules
• 321 series relays
4RF is working with customers to confirm support for other devices as they are identified. The remainder of
this document details the configuration settings and general process to optimize the radio to support
additional devices, in addition to listing expected latencies under different configurations.
General Configuration
The configurations and process are aligned with a 2505 series remote I/O module device with serial baud
rate of 9600. As a ‘fast’ Mirrored Bits® device it is considered a good start point for optimization. For other
baud rates please refer to the table in Initial Setup for Mirrored Bits® Support on page 158 for initial MTU
and IFG settings.
The following are the recommended RF configurations and serial data configuration settings and to optimize
the performance over Aprisa SR+ radios.
Terminal Server
This menu item is only applicable if the serial port has an operating mode of Terminal Server.
The Terminal Server operating mode provides encapsulation of serial data from a local serial port into an IP
packet (over TCP or UDP). This function is typically used for connecting a legacy serial RTU at a remote
radio to an Ethernet SCADA server.
Mode
This parameter defines the mode of operation of the terminal server connection. The default setting is
Client and Server.
Option Function
Client The radio will attempt to establish a TCP connection with the
specified remote address when data is presented on the serial
port.
Server The radio will listen for a TCP connection on the specified local
port.
Data received from any client shall be forwarded to the associated
serial port while data received from that serial port shall be
forwarded to every client with an open TCP connection.
If no existing TCP connections exist, all data received from the
associated serial port shall be discarded.
Client and Server The radio will listen for a TCP connection on the specified local
port and if necessary, establish a TCP connection with the
specified remote unit. Generally, this setting is used for the
remote radio but it should be used carefully as two connections
might be established to the remote address.
Data received from any client shall be forwarded to the associated
serial port while data received from that serial port shall be
forwarded to every client with an open TCP connection.
Note: An active TCP keep alive will generate a small amount of extra network traffic.
PVID
This parameter sets the PVID (port VLAN ID) for each of the terminal servers on the radio.
Protocol Conversion
This parameter defines the mode of operation of the terminal server connection. The default setting is
None.
Option Function
None No terminal server Protocol Conversion
Modbus TCP to Modbus RTU The radio provides a gateway between Modbus TCP to
Modbus RTU.
Modbus TCP to Modbus ASCII The radio provides a gateway between Modbus TCP to
Modbus ASCII.
Local Address
This parameter sets the serial Terminal Server local IP address.
Bridge Mode
The local IP address can be the same as the radio's configured IP address or the Virtual IP address for
protected stations. If it is not the above, then it must be an IP address from a network different from the
radio's network.
Note that the Terminal Server local IP address settings can be the same for other terminal servers in the
radio.
Router Mode
The local IP address must be the same as port 1 (management IP address) of the radio’s configured port IP
addresses or the Virtual IP address for protected stations.
Gateway Router Mode
The local IP address must be the same as the radio's configured IP address or the Virtual IP address for
protected stations.
Local Port
This parameter sets the TCP or UDP port number of the local serial port.
The valid port number range is less than or equal to 49151 but with exclusions of 0, 20, 21, 23, 80, 161, 162,
443, 5445, 6445, 9930 or 9931. The default setting is 20000.
The user is responsible for ensuring that there is no conflict on the network.
Remote Address
This parameter sets the IP address of the server connected to the radio Ethernet port. When the remote
address / port is configured as 0.0.0.0/0, each outgoing UDP packet will be sent to the source address of
the last received UDP packet.
Remote Port
This parameter sets the port number of the server used in TCP client, TCP client server or UDP modes. The
default setting is 0.
Protocol
This parameter sets the L4 TCP/IP or UDP/IP protocol used for terminal server operation. The default setting
is TCP.
Gateway IP Address
This Terminal Server parameter sets the Gateway IP address of a router in the network that serves as the
forwarding router to other networks when no other route specification matches the destination IP address
of a packet.
This is useful when default gateway IP address of the radio and the Terminal Server Gateway IP Address are
on different IP subnet networks.
When all radios are in router mode (GRM / RM) or advanced router mode (AGRM / ARM), the default gateway
IP address of the radio and Gateway IP Address of the Terminal Server are the same, leaving the Gateway
IP Address on the default value of 0.0.0.0 will serve the purpose. Only when the radio and Terminal Server
are with different IP subnets and are connected to different router gateway IP addresses, the default value
shall be set to the appropriate gateway IP address.
Mode
This parameter defines the mode of operation of the serial port. The default setting is Disabled.
Option Function
Disabled The serial port is not required.
Standard The serial port is communicating with serial ports on other
stations.
Standard This mode when used with a small MTU setting provides reduced
(Streaming) latency without introducing gaps in the serial stream by taking
exclusive control of the radio channel.
Terminal Server A base station Ethernet port can communicate with both Ethernet
ports and serial ports on remote radios.
RS-232 traffic is encapsulated in IP packets (see ‘Serial > Port
Setup’ Terminal Server on page 160).
CLI Management The USB host port can be used to access the radio Command Line
Interface (CLI). A USB converter to RS-232 convertor will be
required to connect to a PC.
GPS Receiver – Set if a GPS receiver device is plugged into the radio USB port (see
NMEA0183 ‘GPS Receiver’ on page 167).
Parity
This parameter sets the parity to Even, Odd or None. The default setting is None.
Flow Control
This parameter sets the flow control of the serial port. The default setting is Disabled.
Option Function
None The Aprisa SR+ radio port (DCE) CTS is in a permanent ON (+ve)
state.
CTS-RTS CTS / RTS hardware flow control between the DTE and the Aprisa
SR+ radio port (DCE) is enabled.
If the Aprisa SR+ buffer is full the CTS goes OFF, otherwise CTS is
ON.
CTS-Keying CTS Keying is needed when working with devices that require to be
keyed before sending data;
• Driving legacy modems that use the CTS signal as a key-up
signal.
• Driving RS485 serial links, where the CTS signal is used as a Tx
enable
• Used to enable interfacing between SR+ running bit-oriented
protocol with an OSI MEU device. The CTS signal is wired to the
OSI MEU CD input in this case, as the MEU uses the CD as a
receiver enable signal in bit-oriented mode.
CTS Delay ms
In CTS-Keying mode, this parameter sets the period the between the CTS being set and data being
transmitted. The default setting is 0 ms.
GPS Receiver
This menu item is only applicable if a GPS Receiver device is plugged into the radio USB port.
The radio USB port supports NMEA 0183 - a combined electrical and data specification for communication
between electronics systems and GPS receivers.
Parity
Set to None.
Flow Control
Set to Disabled.
Ethernet
Note: This screen is dependent on the Data Port product option purchased (see ‘Data Interface Ports’ on
page 401). The Data Port product option shown is a 2E2S – two Ethernet ports and two Serial ports
Mode
This parameter controls the Ethernet traffic flow. The default setting is Standard.
Option Function
Standard Enables Ethernet data communication over the radio link but
Ethernet traffic is not switched locally between the two
Ethernet ports.
Switch Ethernet traffic is switched locally between the two
Ethernet ports and communicated over the radio link
Disabled Disables all Ethernet data communications.
Speed (Mbit/s)
This parameter controls the traffic rate of the Ethernet port. The default setting is Auto.
Option Function
Auto Provides auto selection of Ethernet Port Speed
10/100 Mbit/s
10 The Ethernet Port Speed is manually set to 10 Mbit/s
100 The Ethernet Port Speed is manually set to 100 Mbit/s
Duplex
This parameter controls the transmission mode of the Ethernet port. The default setting is Auto.
Option Function
Auto Provides auto selection of Ethernet Port duplex setting.
Half Duplex The Ethernet Port is manually set to Half Duplex.
Full Duplex The Ethernet Port is manually set to Full Duplex.
Function
This parameter controls the use for the Ethernet port. The default setting is Management and User.
Option Function
Management Only The Ethernet port is only used for management of the
network.
Management and User The Ethernet port is used for management of the network
and User traffic over the radio link.
User Only The Ethernet port is only used for User traffic over the radio
link.
FILTER DETAILS
L2 Filtering provides the ability to filter (white list) radio link user traffic based on specified Layer 2 MAC
addresses.
User traffic originating from specified Source MAC Addresses destined for specified Destination MAC
Addresses that meets the protocol type criteria will be transmitted over the radio link.
User traffic that does not meet the filtering criteria will not be transmitted over the radio link.
Management traffic to the radio will never be blocked.
Protocol Type
This parameter sets the EtherType accepted ARP, VLAN, IPv4, IPv6 or Any type.
Example:
In the screen shot, the rules are configured in the base station which controls the Ethernet traffic to the
radio link.
Traffic from an external device with the Source MAC address 00:01:50:c2:01:00 is forwarded over the radio
link if it meets the criteria. All other traffic will be blocked.
• Rule 1 If the Protocol Type is ARP going to any destination MAC address or
• Rule 2 If the Protocol Type is Any and the destination MAC address is 01:00:50:c2:01:02 or
• Rule 3 If the Protocol Type is VLAN tagged packets going to any unicast destination MAC address.
To delete a L2 Filter:
1. Click on an existing rule ‘Select’.
2. Click on Delete.
3. Click on OK.
This page specifies the parameters that relate to all Ethernet ports when working in Bridge Mode. Three
parameters are global parameters for the Ethernet Bridge; enable / disable VLANs, Management VLAN ID
and the Double VLAN ID(S-VLAN) and the priority bit. These parameters can't be defined per port and are
globally defined for the Ethernet Bridge.
VLAN Enabled
This parameter sets if VLAN operation is required on the network. If it is enabled on the base station, it
must also be enabled on the remote / repeater stations. The default is disabled.
Management VLAN
This parameter sets the VLAN ID for management traffic only. The value can be between 1 and 4094. The
default is 1.
PORT PARAMETERS
If double tagging is enabled on the port, incoming frames should always be double tagged.
• If the incoming frame is untagged, then the PVID (port VLAN ID) is used and forwarded with the Port
Ingress priority provided the PVID is configured in the Port VLAN Membership of any of the Ethernet
ports. If not, the frames are dropped.
• If the incoming frame is single tagged, then PVID is used and forwarded with the Port Ingress priority
provided the PVID is configured in the Port VLAN Membership of any of the Ethernet ports. If not the
frames are dropped.
If double tagging is disabled on the port, incoming frames should always be single tagged, untagged or
priority–tagged frames.
Double tagged frames are simply forwarded treating them as if they were single tagged frames. At the egress
of the Ethernet port, such frames are forwarded only if the S-VLAN ID of that frame is a member of the Port
VLAN Membership.
Note: The Port VLAN Membership must contain the PVID. If the Port VLAN Membership does not contain the
PVID, untagged or priority-tagged frames will be discarded.
To Port
This parameter when set copies the port VLAN Membership settings to the other ports.
VLAN ID
This parameter sets the VLAN ID of the port for a maximum 64 active VLANs. The value can be between 1
and 4094. The default is 1.
VLAN Description
This parameter is a freeform field used to identify the VLAN. It can be up to a maximum of 32 characters.
Egress Action
This parameter sets the action taken on the frame on egress from the Ethernet port. The default is Untag
and forward.
Option Function
Untag and forward Removes the tagged information and forwards the
frame. On Ingress, the VLAN tag will be added to the
PVID tag.
Forward Forwards the tagged frame as it is on egress.
On Ingress, traffic is expected to include the VLAN tag
with a member VLAN ID, otherwise the packet will be
dropped.
Controls
IP
See ‘IP > IP Setup > Bridge / Gateway Router Modes’ on page 183 for configuration options.
See ‘IP > IP Setup > Router Mode’ on page 184 for configuration options.
See ‘Advanced Gateway Router Mode (AGRM) and Advanced Router Mode (ARM)’ on page 40 for a detailed
explanation of advanced router modes.
See ‘Advanced Gateway Router Mode (AGRM) and Advanced Router Mode (ARM)’ on page 40 for a detailed
explanation of advanced router modes.
IP Terminal Server converts local incoming IP packets to a local physical serial port and to OTA serial packets.
This function is typically used on a base station to convert traffic to serial OTA for transmission to all remote
radios.
NETWORKING IP SETTINGS
IP Address
Set the static IP Address of the radio (Management and Ethernet ports) assigned by your site network
administrator using the standard format xxx.xxx.xxx.xxx. This IP address is used both in Bridge mode and in
Router mode. The default IP address is in the range 169.254.50.10.
Subnet Mask
Set the Subnet Mask of the radio (Management and Ethernet ports) using the standard format
xxx.xxx.xxx.xxx. The default subnet mask is 255.255.0.0 (/16).
Gateway
Set the Gateway address of the radio, if required, using the standard format xxx.xxx.xxx.
A default gateway is the node on the network that traffic is directed to when an IP address does not match
any other routes in the routing table. It can be the IP address of the router or PC connected to the base
station. The default gateway commonly connects the internal radio network and the outside network. The
default Gateway is 0.0.0.0.
Note: This screen is dependent on the Data Port product option purchased (see ‘Data Interface Ports’ on
page 401). The Data Port product option shown is a 2E2S – two Ethernet ports and two Serial ports
IP Address
Set the static IP Address of the radio Ethernet port (n) assigned by your site network administrator using the
standard format xxx.xxx.xxx.xxx. This IP address is used for this Ethernet port Router mode.
Subnet Mask
Set the Subnet Mask of the radio Ethernet port (n) using the standard format xxx.xxx.xxx.xxx. The default
subnet mask is 255.255.0.0 (/16).
Gateway
Set the Gateway address of the radio Ethernet port (n), if required, using the standard format xxx.xxx.xxx.
A default gateway is the node on the network that traffic is directed to when an IP address does not match
any other routes in the routing table. It can be the IP address of the router or PC connected to the base
station. The default gateway commonly connects the internal radio network and the outside network. The
default Gateway is 0.0.0.0.
Note 1: If the base station RF interface IP address is a network IP address, and if the remote radio is also
using a network IP address within the same subnet or different subnet, then the base radio will assign an
automatic RF interface IP address from its own subnet.
When the base radio has a host specific RF interface IP address, then all the remotes must have a host
specific RF interface IP address from the same subnet.
Note 2: If the user sets the RF interface IP address to a network IP address for Auto IP assignment, then the
radio will ignore the Radio Interface Subnet Mask setting and use a /23 network subnet ignoring the last two
octets.
Note 3: When a remote radio is configured for Router Mode and the base radio is changed from Bridge Mode
to Router Mode and the RF interface IP address is set to Auto IP configuration (at least the last octet of the
RF interface IP address is zero), it is mandatory to configure the network topology by using the
‘Decommission Node’ and ‘Discover Nodes’ (see ‘Maintenance > Advanced’ on page 276).
TERMINAL SERVER
Enabled
This parameter enables IP terminal server.
IP terminal server converts local incoming IP packets to a local physical serial port and to OTA serial packets
as well. This function is typically used on a base station to convert traffic to serial OTA for transmission to
all remote radios.
The serial terminal server traffic can be prioritized separately. For QoS, the priority of the serial terminal
server traffic is that of the configured priority for its associated serial port (see ‘QoS > Traffic Priority’ on
page 205).
Name
This parameter displays the IP terminal server port name.
Serial Port
Option Function
Serial Port This is the normal RS-232 serial ports provided with the RJ45
connector.
USB Serial Port This is the optional RS-232 / RS-485 serial port provided with the
USB host port connector with a USB to RS-232 / RS-485 RJ45
converter cable (see ‘USB RS-232 / RS-485 Serial Port’ on page
434).
Mode
This parameter defines the mode of operation of the terminal server connection. The default setting is
Client and Server.
Option Function
Client The radio will attempt to establish a TCP connection with the
specified remote unit. Generally, this setting is for the base station
with an Ethernet connection to the SCADA master.
Server The radio will listen for a TCP connection on the specified local
port. Generally, this setting is for the remote radio with a serial
connection to the RTU.
Data received from any client shall be forwarded to the associated
serial port while data received from that serial port shall be
forwarded to every client with an open TCP connection.
If no existing TCP connections exist, all data received from the
associated serial port shall be discarded.
Client and Server The radio will listen for a TCP connection on the specified local
port and if necessary, establish a TCP connection with the
specified remote unit. Generally, this setting is used for the
remote radio but it should be used carefully as two connections
might be established with the base station.
Data received from any client shall be forwarded to the associated
serial port while data received from that serial port shall be
forwarded to every client with an open TCP connection.
Note: An active TCP keep alive will generate a small amount of extra network traffic.
PVID
This parameter sets the PVID (port VLAN ID) for each of the terminal servers on the radio.
Protocol Conversion
This parameter defines the mode of operation of the terminal server connection. The default setting is
None.
Option Function
None No terminal server Protocol Conversion
Modbus TCP to Modbus RTU The radio provides a gateway between Modbus TCP to
Modbus RTU.
Modbus TCP to Modbus ASCII The radio provides a gateway between Modbus TCP to
Modbus ASCII.
Local Address
This parameter sets the Terminal Server local IP address.
Bridge Mode
The local IP address can be the same as the radio's configured IP address or the Virtual IP address for
protected stations. If it is not the above, then it must be an IP address from a network different from the
radio's network.
Note that the Terminal Server local IP address settings can be the same for other terminal servers in the
radio.
Router Mode
The local IP address must be the same as any one of the radio's configured port IP addresses or the Virtual
IP address for protected stations.
Gateway Router Mode
The local IP address must be the same as the radio's configured IP address or the Virtual IP address for
protected stations.
Local Port
This parameter sets the TCP or UDP port number of the local serial port.
The valid port number range is less than or equal to 49151 but with exclusions of 0, 20, 21, 23, 80, 161, 162,
443, 5445, 6445, 9930 or 9931. The default setting is 20000.
The user is responsible for ensuring that there is no conflict on the network.
Remote Address
This parameter sets the IP address of the server connected to the radio Ethernet port. When the remote
address / port is configured as 0.0.0.0/0, each outgoing UDP packet will be sent to the source address of
the last received UDP packet.
Remote Port
This parameter sets the TCP or UDP port number of the server connected to the radio Ethernet port. The
default setting is 0.
Protocol
This parameter sets the L4 TCP / IP or UDP / IP protocol used for terminal server operation. The default
setting is TCP.
Gateway IP Address
This Terminal Server parameter sets the Gateway IP address of a router in the network that serves as the
forwarding router to other networks when no other route specification matches the destination IP address
of a packet.
This is useful when default gateway IP address of the radio and the Terminal Server Gateway IP Address are
on different IP subnet networks.
When all radios are in router mode (GRM / RM) or advanced router mode (AGRM / ARM), the default gateway
IP address of the radio and Gateway IP Address of the Terminal Server are the same, leaving the Gateway
IP Address on the default value of 0.0.0.0 will serve the purpose. Only when the radio and Terminal Server
are with different IP subnets and are connected to different router gateway IP addresses, the default value
shall be set to the appropriate gateway IP address.
IP > L3 Filtering
This page is only available if the Ethernet traffic option has been licensed (see ‘Maintenance > Licence’ on
page 270). The filter operates in either Bridge Mode or Router Mode (see 'Terminal > Operating Mode’ on
page 119).
Entering a * into any to field will automatically enter the wildcard values when the data is saved.
Priority
This parameter shows the priority order in which the filters are processed.
Action
This parameter defines the action taken on the packet when it meets the filter criteria.
Option Function
Process Processes the packet if it meets the filter criteria
Discard Discards the packet if it meets the filter criteria
Source IP Address
If the source IP address is set to 0.0.0.0, any source IP address will meet the filter criteria.
Note: The source wildcard mask operation is the inverse of subnet mask operation
Destination IP Address
This parameter defines the destination IP address of the filter. If the destination IP address is set to 0.0.0.0,
any destination IP address will meet the filter criteria.
Note: The destination wildcard mask operation is the inverse of subnet mask operation
Protocol
This parameter defines the Ethernet packet type that will meet the filter criteria.
Controls
IP > IP Routes
This page is only available if the Ethernet traffic option has been licensed (see ‘Maintenance > Licence’ on
page 270) and Router Mode selected. It is not valid for Bridge Mode (see 'Terminal > Operating Mode’ on
page 119).
Route Index
This parameter shows the route index.
Destination Address
This parameter defines the destination IP address of the route criteria.
Destination Mask
This parameter defines the subnet mask applied to the Destination IP Address. 255 means that it must be a
match.
If the destination subnet mask is set to 255.255.255.255, all octets of the Destination IP Address will be
evaluated for the route criteria.
If the destination subnet mask is set to 255.255. 0.0, the first 2 octets of the Destination IP Address will be
evaluated for the route criteria.
Gateway Address
This parameter sets the gateway address where packets will be forwarded to.
• If the gateway interface is set to Ethernet Ports, the gateway address is the IP address of the device
connected to the Ethernet port.
• If the gateway interface is set to Radio Path, the gateway address is the IP address of the remote
radio.
Gateway Interface
This parameter sets the destination interface.
Option Function
Ethernet Ports Packets are forwarded to the Ethernet interface port.
Radio Path Packets are forwarded to the RF Interface radio path.
IP > NAT
This page is only available if the Ethernet traffic option has been licensed (see ‘Maintenance > Licence’ on
page 270) and Router Mode selected. It is not valid for Bridge Mode (see 'Terminal > Operating Mode’ on
page 119).
Mode
Option Function
Disabled No Network Address Translation
One to One NAT mapping (translating) of public interface IP address
space into another private interfaces IP address space and
vice versa via AGRM/ARM router.
Port Forwarding NAT mapping (translating) of public TCP/UDP port (or ICMP
query ID) of a single public IP addresses into multiple private
IP address space and vice versa via AGRM/ARM router.
One To One
The One-to-One Network Address Translation (NAT) remaps one public interface IP address space into
another private interface IP address space and vice versa by modifying the IP network address information
in IP datagram packet headers.
The NAT function is only available in Advanced Gateway Router Mode (AGRM) or Advanced Router Mode
(ARM).
The current implementation of One-to-One NAT supports network configurations supported in AGRM / ARM
mode, such as AGRM / ARM-Bridge, Bridge-AGRM / ARM and Bridge-Mix [AGRM / ARM and Bridge] i.e. other
network configuration options are not supported by NAT, such as AGRM / ARM-AGRM / ARM network). For
more detailed information about NAT see section ‘Network Address Translation (NAT) Router’ on page 45.
Public Interface
This parameter sets the Global external / public interface.
Option Function
Radio Port The public interface for NAT is the radio port.
Ethernet Port (n) The public interface for NAT is Ethernet port n.
The RF Port configures the inbound NAT translation rules (public to private interface translation direction)
for the selected public interface which in this case is the RF port. NAT will perform the IP address translation
on the inbound direction whenever there is a matching rule in the public IP address and protocol fields
translating it to the private IP address. Outbound NAT translation function (private to public interface
translation direction) will perform the IP address translation whenever there is a matching rule in the private
IP address and protocol fields translating it to the public IP address.
Protocol
The matching protocol where NAT should perform the IP address translation function. Supports ICMP, TCP,
UDP or Any (Any means one among the list; ICMP, TCP, UDP).
Active
If checked the rule becomes active, if unchecked the rule is inactive.
The Ethernet Ports configures the inbound NAT translation rules (public to private interface translation
direction) for the selected public interface which in this case is the Ethernet port. NAT will perform the IP
address translation on the inbound direction whenever there is a matching rule in the public IP address and
protocol fields translating it to the private IP address. Outbound NAT translation function (private to public
interface translation direction) will perform the IP address translation whenever there is a matching rule in
the private IP address and protocol fields translating it to the public IP address.
Protocol
The matching protocol where NAT should perform the IP address translation function. Supports ICMP, TCP,
UDP or Any (Any means one among the list; ICMP, TCP, UDP).
Active
If checked the rule becomes active, if unchecked the rule is inactive.
Port Forwarding
Port Forwarding NAT (NAPT) remaps the public TCP/UDP port (or ICMP query ID) of a single public IP address
into multiple private IP address spaces and vice versa via AGRM/ARM router.
Public Interface
This parameter sets the Global external /public interface. The page varies depending on the router mode
ARM and AGRM.
The table below shows the public interface options for ARM router (as shown in the screenshot above for
2E2S radio). In ARM, each Ethernet interface can be set with a different public IP address, thus a multiple
Ethernet port can be used as a public interface. This is useful for example when radio is connected via two
Ethernet ports to two different networks with different subnets for protection or for different services e.g.
SCADA service and management service.
Option Function
Radio Port The public interface for NAT is the radio port.
Ethernet Port 1 The public interface for NAT is a Ethernet port 1.
Ethernet Port 2 The public interface for NAT is a Ethernet port 2.
The table below shows the public interface options for a AGRM router, since in AGRM all Ethernet interfaces
can be set with only a single public IP address.
Option Function
Radio Port The public interface for NAT is the radio port.
Ethernet Ports The public interface for NAT is a Ethernet port.
When the RF Port is selected as the public interface, then the inbound NAT session is from the radio RF port
to the Ethernet private network side of the network (public to private interface), commonly used in remotes.
NAT will perform the translation on the inbound direction whenever there is a matching rule in the public
TCPU/UDP port, the single IP address of RF port and protocol fields translating it to the multiple private IP
address space.
Outbound NAT translation function (private to public interface translation direction) will perform the IP
address translation whenever there is a matching rule in the TCP/UDP port and private IP address and
protocol fields or a dynamic rule is created translating it to the single public IP address and TCP/UDP port.
Protocol
The matching protocol where NAT should perform the IP address translation function. Supports ICMP, TCP,
UDP or Any (Any means one among the list; ICMP, TCP, UDP).
Active
If checked the rule becomes active, if unchecked the rule is inactive.
When the Ethernet Port is selected as the public interface, then the inbound NAT session is from the Ethernet
port to the RF port private network side of the network (public to private interface), commonly used in Base
station. NAT will perform the translation on the inbound direction whenever there is a matching rule in the
public TCPU/UDP port, the single IP address of the Ethernet port and protocol fields translating it to the
multiple private IP address space.
Outbound NAT translation function (private to public interface translation direction) will perform the IP
address translation whenever there is a matching rule in the TCP/UDP port and private IP address and
protocol fields or a dynamic rule is created translating it to the single public IP address and TCP/UDP port.
Protocol
The matching protocol where NAT should perform the IP address translation function. Supports ICMP, TCP,
UDP or Any (Any means one among the list; ICMP, TCP, UDP).
Active
If checked the rule becomes active, if unchecked the rule is inactive.
QoS
See ‘QoS > Traffic Priority’ and ‘QoS > Traffic Classification’ for configuration options.
TRAFFIC PRIORITY
SERIAL PRIORITY
This parameter controls the per port priority of the serial customer traffic relative to the Ethernet customer
traffic. If equal priority is required to Ethernet traffic, this setting must be the same as the Ethernet Data
Priority setting.
The serial data priority can be set to Very High, High, Medium and Low. The default setting is Low.
A queuing system is used to prioritize traffic from the serial and Ethernet interfaces for over the air
transmission. A weighting may be given to each data type and this is used to schedule the next transmission
over the air e.g. if there are pending data packets in multiple buffers but serial data has a higher weighting
it will be transmitted first. The serial buffer is 20 serial packets (1 packet can be up to 512 bytes).
There are four priority queues in the Aprisa SR: Very High, High, Medium and Low. Data is added to one of
these queues depending on the priority setting. Data leaves the queues from highest priority to lowest: the
Very High queue is emptied first, followed by High then Medium and finally Low.
ETHERNET PRIORITY
This parameter controls the per port priority of the Ethernet customer traffic relative to the serial customer
traffic. If equal priority is required to serial traffic, this setting must be the same as the Serial Data Priority
setting.
The Ethernet Priority enables users to set the priority of Ethernet port ingress frames. The priority for each
port can be:
Priority Description
Low All port frames are set to low priority
Medium All port frames are set to medium priority
High All port frames are set to high priority
Very High All port frames are set to very high priority
From Tagged Frame (PCP) All port frames are set to PCP priority bits (VLAN priority) in
VLAN tagged frames or priority tag (VLAN 0) frames.
To enable, see ‘PCP (Priority Code Point)’ on page 207.
From Packet (DSCP) All port frames are set to DSCP priority bits in an IP packet
(DSCP in IPv4 TOS field).
To enable, see ‘DSCP (Differentiated Services Code Point)’
on page 209.
A queuing system is used to prioritize customer traffic from the serial and Ethernet interfaces for over the
air transmission. A weighting may be given to each data type and this is used to schedule the next
transmission over the air e.g. if there are pending data packets in multiple buffers but serial data has a
higher weighting it will be transmitted first. The Ethernet buffer is 10 Ethernet packets (1 packet can be up
to Ethernet MTU, 1536 bytes).
There are four priority queues in the Aprisa SR+: Very High, High, Medium and Low priority. Data is added
to one of these queues depending on the priority setting. Data leaves the queues from highest priority to
lowest; the Very High queue is emptied first, followed by High then Medium and finally Low.
PRIORITY DEFINITIONS
PCP (Priority Code Point)
These settings provide priority translation / mapping between the external radio LAN VLAN priority network
and the radio internal VLAN priority network, using the VLAN tagged PCP (Priority Code Point) priority field
in the Ethernet/VLAN frame.
The IEEE 802.1Q specification defines a standards-based mechanism for providing VLAN tagging and class of
service (CoS) across Ethernet networks. This is accomplished through an additional VLAN tag, which carries
VLAN tag ID and frame prioritization information (PCP field), inserted within the header of a Layer 2 Ethernet
frame.
Priority Code Point (PCP) is a 3-bit field that indicates the frame priority level (or CoS). The operation of
the PCP field is defined within the IEEE 802.1p standard, which is an extension of 802.1Q. The standard
establishes eight levels of priority, referred to as CoS values, where CoS 7 (‘111’ in PCP filed) is the highest
priority and CoS 0 (‘000’) is the lowest priority.
The radio in bridge mode used the PCP value in the VLAN tag to prioritize packets and provide the
appropriate QoS treatment per traffic type. The radio implements 4 priority queuing techniques that base
its QoS on the VLAN priority (PCP). Based on VLAN priority bits, traffic can be put into a particular Class of
Service (CoS) queue. Packets with higher CoS will always serve first for OTA transfer and on ingress/egress
Ethernet ports.
The ‘PCP priority definition’ tab is used to map ingress VLAN packet with PCP priority to the radio internal
CoS (priority). Since, in most of the cases the radio VLAN network is connected to the corporate VLAN
networks, the network administrator might like to have a different VLAN priority scheme of the radio
network CoS. For example, management traffic in the multi-gigabit corporate VLAN network might be
prioritize with priority 7 (highest priority) and SCADA traffic with priority 5, but in the narrow bandwidth
radio network, SCADA traffic will be map to radio very high CoS / priority (i.e. set PCP 5 = Very high) and
management traffic might will be map to radio medium CoS / priority (i.e. set PCP 7 = medium) in order to
serve first the mission-critical SCADA traffic over the radio network.
This is done by mapping the external radio network VLAN priority to the internal radio CoS / priority using
the ‘PCP priority definition’ tab. The radio support 4 queues, thus at maximum an 8 -> 4 VLAN priority / CoS
mapping is done.
Default mapping of ingress packet VLAN priority to radio CoS / priority shown in the ‘PCP priority definition’
tab.
Default Priority
When the priority of an Ethernet port uses the PCP bits (VLAN priority) values the ‘Default Priority’ option
is enabled, allowing the priority of untagged VLAN frames to be set to Very High, High, Medium or Low
priority.
Differentiated Services (DiffServ) is a new model in which traffic is treated by routers with relative priorities
based on the IPv4 type of services (ToS) field. DSCP (DiffServ Code Point) standard defined in RFC 2474 and
RFC 2475. DiffServ increases the number of definable priority levels by reallocating bits of an IP packet for
priority marking.
The DiffServ architecture defines the DiffServ (DS) field, which supersedes the ToS field in IPv4 to make
per-hop behaviour (PHB) decisions about packet classification and traffic scheduling functions. The six most
significant bits of the DiffServ field (in the IPv4 TOS field) is called as the DSCP. The standardized DiffServ
field of the packet is marked with a value so that the packet receives a particular routing/forwarding
treatment or PHB, at each router node. Using DSCP packet classification, traffic can be partition into
multiple priority levels.
The radio in router mode uses the DSCP value in the IP header to select a PHB behaviour for the packet and
provide the appropriate QoS treatment. The radio implements 4 priority queuing techniques that base its
PHB on the DSCP in the IP header of a packet. Based on DSCP, traffic can be put into a particular priority /
CoS (Class of Service) queue. Packets with higher CoS will always serve first for OTA transfer and on ingress
/ egress Ethernet ports.
The ‘DSCP priority definition’ tab is used to map ingress IP packet with DSCP priority to the radio internal
priority / CoS. Since, in most of the cases the radio routed network is connected to the corporate routed
networks, the network administrator might like to have a different routed network priority scheme of the
radio network, for example management traffic in the multi-gigabit corporate routed network might be
prioritize with DSCP EF (expedite forwarding) code (DSCP highest priority), and SCADA traffic with DSCP
AF11 (assured forwarding) code (high priority), but in the narrow bandwidth radio network, SCADA traffic
will be map to radio very high CoS / priority (i.e. set AF11 = Very high) and management traffic might map
to radio low CoS / priority (i.e. set EF = Low) in order to serve first the mission-critical SCADA traffic over
the radio network.
This is done by mapping the external radio network DSCP priority to the internal radio CoS / priority levels
using the ‘DSCP priority definition’ tab. The radio support four queues, thus at maximum a 64 -> 4 CoS /
priority mapping is done.
Default mapping of ingress packet DSCP priority to radio CoS shown in the ‘DSCP priority definition’ tab.
The radio maps all 64 DSCP values. The user can configure most common used 21 DSCP codes and the rest
are mapped by default to low CoS / priority.
Default Priority
When the priority of an Ethernet port uses the DSCP priority (in IPv4 TOS field) values the ‘Default Priority’
option is enabled, allowing the priority of ARP frames to be set to Very High, High, Medium or Low priority.
TRAFFIC CLASSIFICATION
VLAN bridge mode traffic classification settings provide mapping / assigning of profiles (set by rules to match
a specific traffic type) to a VLAN ID and VLAN CoS / priority. The profile which is used to match to a specific
traffic type will be identified in the radio network by its associated VLAN ID and VLAN CoS / priority to
provide the appropriate QoS treatment. CoS / Priority can be set to Very High, High, Medium and Low
priority.
Profile name
A free form field to enter the profile name with a maximum of 32 chars.
Assigned Priority
Traffic packets that match the applied profile rules will be assigned to the selected ‘assigned priority’
setting of Very High, High, Medium and Low. This field cannot be set to Don’t Care.
This applies profile rule mapping to the VLAN CoS / Priority with the appropriate internal radio assigned
priority setting of Very High, High, Medium and Low priority.
Assigned VLAN ID
Traffic packets that match the applied profile rules will be assigned to the selected ‘assigned VLAN ID’
setting of VLAN ID in the range of 0 to 4095.
A VLAN ID of an ingress packet matching the classification rule (see ‘VLAN ID’ rule in next page) shall be
changed to the ‘assigned VLAN ID’ setting, if below conditions are met:
1. The VLAN ID of Ingress packet is same as PVID of the ingress port.
2. Packet is received untagged at the port
If the VLAN ID of the tagged ingress packet is not the same as the PVID of the ingress port, then it shall not
be changed and the ‘assigned VLAN ID’ setting is ignored i.e. ingress VLANs will pass-through unchanged.
If ‘assigned VLAN ID’ value is set in the ‘port VLAN membership’ under Ethernet > VLAN (port x tab), then
this VLAN will be available for ingress and egress on the Ethernet and RF ports, otherwise this VLAN will only
be available in one direction on the egress RF port.
For example, if the base station Ethernet port 1 ‘assigned VLAN ID’ = 100 (VLAN-100) and it is also defined
in the ‘port VLAN membership’ under Ethernet > VLAN (port 1 tab) and the remote sends a packet to the
base with a VLAN of 100, this packet will be egress out to Ethernet port 1 (tagged or untagged based on the
‘egress action’ definition). If the VLAN-100 wasn’t set in the ‘port VLAN membership’, then the base station
will drop a packet from the remote.
This setting parameter can be ‘Don’t Care’ (Assigned VLAN ID = 0) which means that the VLAN ID of ingress
frame will never be modified.
Active
Activates or deactivates the profile rule.
Controls
The Save button saves all profiles to the radio.
The Cancel button removes all changes since the last save or first view of the page if there has not been
any saves. This button will un-select all the Select radio buttons.
The Edit button will show the next screen for the selected profile where the profile can be configured. This
button will be disabled unless a profile is selected.
The Add button adds a new profile,
• If no profile was selected then the new profile is added to the end of the list,
• If a profile is selected the new profile is added after that profile.
The Delete button will delete the selected profile. The button will be disabled unless a profile has been
selected.
The Delete All button will delete all the profiles. A pop-up will ask if the action is correct. If the answer is
yes, then all profiles are deleted in SuperVisor. The Save button must be pressed to delete all the profiles
in the radio.
The Move up button will move the selected profile up one in the order of profiles
The Move Down button will move the selected profile down one in the order of profiles
The Previous button displays the previous page in the list of profiles. A pop up will be displayed if any profile
has been modified and not saved, preventing the previous page being displayed.
The Next button will display the next page in the list of profiles.
To edit a traffic classification, select the profile and click on the Edit button
VLAN ID
Sets the layer 2 packet Ethernet header VLAD ID field in the selected profile classification rule. Valid values
are between 0 and 4095. This VLAN ID should be enabled in the system for using this parameter during
classification.
Enable this VLAN in the network by setting the same VLAN ID value in PVID (port VLAN ID) and in the PORT
VLAN MEMBERSHIP under ‘VLAN PORT SETTINGS – Port 1’ on page 175. If the VLAN ID is set to zero, all VLAN
IDs will meet the criteria.
PRIORITY CRITERIA
Priority Type
Set the layer 2 Ethernet or layer 3 IP packet header priority type fields in the selected profile classification
rules.
The following table shows the layer 3 packet IP header DSCP priority field values
Click on More Options if more Layer 2/3/4 (Ethernet / IP / TCP or UDP) packet header fields are required
for the selected profile classification rule. This page describes all the possible fields that can be used for
the classification rules in bridge mode.
ETHERNET CRITERIA
Source MAC Address
This parameter sets the Layer 2 Ethernet packet header Source MAC Address field in the selected profile
classification rule in the format of ‘hh:hh:hh:hh:hh:hh’.
EtherType (Hex)
This parameter sets the Layer 2 Ethernet packet header EtherType field in the selected profile classification
rule. EtherType is a 16 bit (two octets) field in an Ethernet frame. It is used to indicate which protocol is
encapsulated in the payload of an Ethernet Frame.
EtherType Examples:
IP CRITERIA
Source IP Address
This parameter sets the Layer 3 IP packet header Source IP Address field in the selected profile classification
rule. This parameter is written in the standard IPv4 format of ‘xxx.xxx.xxx.xxx’.
Note: The wildcard mask operation is the inverse of subnet mask operation
Destination IP Address
This parameter sets the Layer 3 IP packet header Destination IP Address field in the selected profile
classification rule. This parameter is written in the standard IPv4 format of ‘xxx.xxx.xxx.xxx’.
Note: The wildcard mask operation is the inverse of subnet mask operation
IP Protocol Number
This parameter sets the Layer 3 IP packet header ‘Protocol’ field in the selected profile classification rule.
This field defines the protocol used in the data portion of the IP datagram.
Protocol number Examples:
Destination Range
This parameter sets the Layer 4 TCP / UDP packet header Destination Port or Destination Port range field
in the selected profile classification rules. To specify a range, insert a dash between the ports e.g. 1000-
2000. If the source port range is set to 1-65535, traffic from any source port will meet the criteria.
TRAFFIC CLASSIFICATION
Router Mode traffic classification settings provide mapping / assigning of profiles (set by rules to match a
specific traffic type) to a CoS / priority. The profile which is used to match to a specific traffic type will be
identified in the radio network by its associated CoS / priority to provide the appropriate QoS treatment.
CoS / Priority can be set to very high, high, medium, low priority.
Profile name
A free form field to enter the profile name with a maximum of 32 chars.
Assigned Priority
Traffic packets that match the applied profile rules will be assigned to the selected ‘assigned priority’
setting of Very High, High, Medium and Low. This field cannot be set to Don’t Care.
Active
Activated or deactivate the profile rule.
Controls
The Save button saves all profiles to the radio.
The Cancel button removes all changes since the last save or first view of the page if there has not been
any saves. This button will un-select all the Select radio buttons.
The Edit button will show the next screen for the selected profile where the profile can be configured. This
button will be disabled unless a profile is selected.
The Add button adds a new profile,
• If no profile was selected then the new profile is added to the end of the list,
• If a profile is selected the new profile is added after that profile.
The Delete button will delete the selected profile. The button will be disabled unless a profile has been
selected.
The Delete All button will delete all the profiles. A pop-up will ask if the action is correct. If the answer is
yes, then all profiles are deleted in SuperVisor. The Save button must be pressed to delete all the profiles
in the radio.
The Move up button will move the selected profile up one in the order of profiles
The Move Down button will move the selected profile down one in the order of profiles
The Previous button displays the previous page in the list of profiles. A pop up will be displayed if any profile
has been modified and not saved, preventing the previous page being displayed.
The Next button will display the next page in the list of profiles.
To edit a traffic classification, select the profile and click on the Edit button
PRIORITY CRITERIA
DSCP Range
Sets the DSCP priority value/s field in the selected profile classification rule. The value can be set to a
single priority or a single range (no multiple range are allowed), for example, priority value can be 46 (EF)
or a range of priority values like 10-14.
The following table shows the layer 3 packet IP header DSCP priority field values
Click on More Options if more Layer 3/4 packet header fields are required for the selected profile
classification rule. This page describes all the possible fields that can be used for the classification rules in
router mode.
IP CRITERIA
Source IP Address
This parameter sets the Layer 3 packet IP header Source IP Address field in the selected profile classification
rules. This parameter is written in the standard IPv4 format of ‘xxx.xxx.xxx.xxx’.
Note: The wildcard mask operation is the inverse of subnet mask operation
Destination IP Address
This parameter sets the Layer 3 packet IP header Destination IP Address field in the selected profile
classification rules. This parameter is written in the standard IPv4 format of ‘xxx.xxx.xxx.xxx’.
Note: The wildcard mask operation is the inverse of subnet mask operation
Protocol Number
This parameter sets the Layer 3 IP packet header ‘Protocol’ field in the selected profile classification rule.
This field defines the protocol used in the data portion of the IP datagram.
Protocol number Examples:
Destination Range
This parameter sets the Layer 4 TCP / UDP packet header Destination Port or Destination Port range field
in the selected profile classification rule. To specify a range, insert a dash between the ports e.g. 1000-
2000. If the source port range is set to 1-65535, traffic from any source port will meet the criteria.
Security
See ‘Security > Setup’ and ‘Security > Manager’ for configuration options.
Security Scheme
This parameter sets the security scheme to one of the values in the following table:
Security Scheme
Disabled (No encryption and no Message Authentication Code)
AES Encryption + CCM Authentication 128 bit
AES Encryption + CCM Authentication 64 bit
AES Encryption + CCM Authentication 32 bit
AES Encryption only
CCM Authentication 128 bit
CCM Authentication 64 bit
CCM Authentication 32 bit
Option Function
Pass Phrase Use the Pass Phrase password format for standard security.
Raw Hexadecimal Use the Raw Hexadecimal key format for better security. It
must comply with the specified encryption key size e.g. if
Encryption Type to AES128, the encryption key must be 16
bytes (32 chars)
Raw Hexadecimal
The Raw Hexadecimal key must comply with the specified encryption key size e.g. if Encryption Type to
AES128, the encryption key must be 16 bytes (32 chars).
When the Payload Encryption Key is changed, you will be prompted for confirmation of the key to avoid
mistypes.
Option Function
Encrypt All Packets Encrypts all payload packets
Exclude IPSEC Packet Re- Excludes radio encryption of already encrypted IPSec
encryption packets. This improves throughput for already encrypted
traffic because the radio encryption overhead is not added
to each packet. Radio encryption is still added for
unencrypted user packets
Option Function
Pass Phrase Use the Pass Phrase password format for standard security.
Raw Hexadecimal Use the Raw Hexadecimal key format for better security. It
must comply with the specified encryption key size
e.g. if Encryption Type to AES128, the encryption key must
be 16 bytes (32 chars)
When the Key Encryption Key is changed, you will be prompted for confirmation of the key to avoid mistypes.
Option Function
USB Storage Not Detected A USB flash drive is not plugged into the radio host port.
USB Storage Detected A USB flash drive is plugged into the radio host port.
Note: 4RF radios only support the FAT32 file system for flash drives. If the flash drive is a different format
such as exFAT or NTFS, you will need to reformat it to FAT32.
Also, some brands of USB flash drives may not work with 4RF radios.
Controls
The ‘Save’ button saves the Key Encryption Key settings to the radio. If the Security Level is set to Strong
(see ‘Security Level’ on page 237), this button will be grayed out.
The ‘Load From USB’ button loads the Key Encryption Key settings from the USB flash drive. If a USB flash
drive is not detected, this button will be grayed out
The ‘Copy To USB’ button copies the Key Encryption Key settings to a file called ‘asrkek.txt’ on the USB
flash drive. This settings file can be used to load into other radios. If a USB flash drive is not detected or
the Security Level is set to Strong (see ‘Security Level’ on page 237), this button will not be shown.
The security of over-the-air-rekeying depends on a truly random Key Encryption Key. This is why the use of
a Raw Hexadecimal key is recommended as a plain text phrase based on known spelling and grammar
constructs is not very random. The default Key Encryption Key is provided only to allow testing of the
security mechanism and is not intended for operational use. Using the default Key Encryption Key
undermines the security of the AES payload encryption because an attacker using the default Key Encryption
Key would immediately recover the AES payload key after the first over-the-air-rekeying event.
When the Security Level is set to Strong, various protections are applied to the Key Encryption Key setting
to prevent tampering. In addition, the Key Encryption Key Type, Key Encryption Key Size, and the Key
Encryption Key itself are all loaded from a customer prepared USB key. This is a one way operation to
prevent key recovery from radios. While the ability to save a Key Encryption Key to USB exists in Standard
Security Level, the Strong Security Level Key Encryption Key is not compromised because the Strong Key
Encryption Key is not the same as the Standard Security Level Key Encryption Key.
HTTPS option
This parameter option determines if you can manage the radio via a HTTPS session (via a Browser). The
default setting is disabled (see ‘certificate’ CLI commands for managing HTTPS certificates on page 395).
SNMP Protocol
This parameter sets the SNMP Protocol:
Option Function
Disabled All SNMP functions are disabled.
All Versions Allows all SNMP protocol versions.
SNMPv3 Only Only SNMPv3 transactions will be accepted.
SNMPv3 With Only SNMPv3 transactions authenticated using HMAC-MD5 or
Authentication Only HMAC-SHA will be accepted (as per table below).
SNMPv3 With Encryption Only SNMPv3 transactions authenticated using HMAC-MD5 or
and Authentication HMAC-SHA with an encrypted type of DES or AES will be
accepted (as per table below).
Changing the privUserSHA user authentication key / password from privUserSHA to privUserSHANew:
c:\usr\bin>snmpusm -v 3 -u privUserSHA -n priv -l authPriv -a SHA -A privUserSHA -x AES -X
privUserSHANew -Ca 172.17.70.17 passwd privUserSHA privUserSHANew
Changing the desUserSHA user encryption key / password from desUserSHA to desUserSHANew:
c:\usr\bin>snmpusm -v 3 -u desUserSHA -n priv -l authPriv -a SHA -A desUserSHA -x DES -X desUserSHA
-Cx 172.17.70.17 passwd desUserSHA desUserSHANew
Changing the desUserSHA user authentication key / password from desUserSHA to desUserSHANew:
c:\usr\bin>snmpusm -v 3 -u desUserSHA -n priv -l authPriv -a SHA -A desUserSHA -x DES -X
desUserSHANew -Ca 172.17.70.17 passwd desUserSHA desUserSHANew
Changing the privUserMD5 user encryption key / password from privUserMD5 to privUserMD5New:
c:\usr\bin>snmpusm -v 3 -u privUserMD5 -n priv -l authPriv -a MD5 -A privUserMD5 -x AES -X privUserMD5
-Cx 172.17.70.17 passwd privUserMD5 privUserMD5New
Changing the privUserMD5 user authentication key / password from privUserMD5 to privUserMD5New:
c:\usr\bin>snmpusm -v 3 -u privUserMD5 -n priv -l authPriv -a MD5 -A privUserMD5 -x AES -X
privUserMD5New -Ca 172.17.70.17 passwd privUserMD5 privUserMD5New
Changing the desUserMD5 user encryption key / password from desUserMD5 to desUserMD5New:
Changing the desUserMD5 user authentication key / password from desUserMD5 to desUserMD5New:
c:\usr\bin>snmpusm -v 3 -u desUserMD5 -n priv -l authPriv -a MD5 -A desUserMD5 -x DES -X
desUserMD5New -Ca 172.17.70.17 passwd desUserMD5 desUserMD5New
Changing the authUserSHA user authentication key / password from authUserSHA to authUserSHANew:
c:\usr\bin>snmpusm -v 3 -u authUserSHA -n auth -l authNoPriv -a SHA -A authUserSHA -Ca 172.17.70.17
passwd authUserSHA authUserSHANew
Changing the authUserMD5 user authentication key / password from authUserMD5 to authUserMD5New:
c:\usr\bin>snmpusm -v 3 -u authUserMD5 -n auth -l authNoPriv -a MD5 -A authUserMD5 -Ca 172.17.70.17
passwd authUserMD5 authUserMD5New
Notes
-Cx option is to change the Encryption key/password
-Ca option is to change the Authentication key/password
Other information on this utility can be obtained from the utility command help itself or online
Summary
It is necessary to record the new passphrases loaded into the Aprisa SR+ radios and then load the passphrases
into the SNMP manager. There is a separate passphrase for the two supported forms of authentication (MD5
and SHA1) only as well as the two forms of authentication used in combination the two forms of encryption
(DES and AES). It is vital to change all passphrases even if the depreciated mechanism is not used (MD5 and
DES) otherwise an attacker could still use the default passphrases.
Note: USM users are not related to CLI and SuperVisor users. This command will only be accessible to the
CLI ‘admin’ user logins.
1. Telnet into each radio in the network and via the CLI reset the passphrases
2. Login to the radio with:
Login: admin
Password: *********
3. Set all SNMP3 users to default values with the ‘snmpusm reset’ command (see ‘SNMP3 users to default
values’ below for the list of default values).
4. Reboot the radio with the ‘reboot’ command.
SSH
This parameter enables / disables Secure Shell (SSH). The default setting is enabled.
Strong ✓ ✓ ✓ ✓
If the Security Level is reduced, there will be a pop up message warning that Key Encryption Key will be
reset to the default value.
If the Security Level is increased, there will be a pop up message reminding user to enter a new Key
Encryption Key.
If the Security Level is set to Strong, the ‘Save’ button will be grayed out and the ‘Copy To USB’ button will
not be shown.
net-snmp command examples (where ‘SNMP Protocol=All Version’ at 'Supervisor > Security > Setup' page):
Example 5: SNMPWALK
snmpwalk -v2c -c public.runit_10.30.56.81 10.30.56.80 1.3.6.1.4.1.14817.7
Settings
Option Function
Disabled Disables login protection
Attack Slowdown In this mode, the user account will be locked out for the duration
specified in Level 1 Lockout Duration and Level 2 Lockout Duration,
cycling between the two.
This mode slows down attacks.
Attack Lockout In this mode, the user account will be permanently locked out if
the protection mechanism has reached Locked Level 1 and Locked
Level 2 and the next login attempt fails.
The user account must then be manually unlocked by an ‘Admin’
user account either from SuperVisor or via SNMP.
This mode blocks persistent attacks.
Attack Slowdown
The Attack Slowdown login protection lockout mechanism will be processed as follows:
• When the number of login failure attempts is less than the setting of the ‘Login Failure Attempts’
field, the login attempt is processed.
• When the number of login failure attempts is greater than the setting of the ‘Login Failure Attempts’
field, the user account will be:
o temporarily disabled at level 1 for the ‘Level 1 Lockout Duration’ period, if the user account was
not previously already released from locked level 2.
o temporarily disabled at level 2 for the ‘Level 2 Lockout Duration’ period, if the user account was
previously already released from locked level 1.
This lockout mode will cycle the lockout of the accounts between locked level 1 and locked level 2.
Attack Lockout
The Attack Lockout login protection lockout mechanism will be processed as follows:
• When the number of login failure attempts is less than the setting of the ‘Login Failure Attempts’
field, the login attempt is processed.
• When the number of login failure attempts is greater than the setting of the ‘Login Failure
Attempts’ field, the user account will be:
o temporarily disabled at level 1 for the ‘Level 1 Lockout Duration’ period, if the user account was
not previously already released from locked level 1.
o temporarily disabled at level 2 for the ‘Level 2 Lockout Duration’ period, if the user account was
previously already released from locked level 1.
o permanently disabled if the user account was previously already released from locked level 2.
The user account must then be manually unlocked by an ‘Admin’ user account either from
SuperVisor or via SNMP.
Accounts
Note: You must login with ‘admin’ privileges to add, disable, delete a user or change a password.
If the currently viewed page is full (displaying 8 user accounts), SuperVisor shall automatically display the
last user account page when a new user is added. However, if there are unsaved changes on the current
page, the user shall be prompted to save the changes first before adding a new user.
See ‘SuperVisor Menu’ on page 103 for the list of SuperVisor menu items versus user privileges.
When the password is changed, you will be prompted for confirmation of the password to avoid mistypes.
5. Click Save.
Status
The Status indicates whether a user account is active or locked out.
Option Function
ACTIVE The user account is currently active.
PENDING The user account has been entered but not saved.
LOCKED (Level 1) Login Protection Mode is active and the user account has been
locked out due to repeated unsuccessful login attempts. The
account will remain locked out for a period defined in ‘Level 1
Lockout Duration’ at the ‘Security > Users’ > Settings tab.
LOCKED (Level 2) Login Protection Mode is active and the user account has been
locked out due to repeated unsuccessful login attempts. The
account will remain locked out for a period defined in ‘Level 2
Lockout Duration’ at the ‘Security > Users’ > Settings tab.
LOCKED Login Protection Mode is active and the user account has been
locked out due to repeated unsuccessful login attempts. The user
account is permanently locked out.
This tab shall also provide the interface for the ADMIN user to unlock any locked user accounts.
The ‘Unlock’ button shall be disabled unless a locked account is selected, in which case, clicking the button
will unlock the selected account.
To delete a user:
1. Select Terminal Settings > Security > Users
2. Click on the Select button for the user you wish to delete.
3. Click ‘Delete
4. Click Save.
The user can delete any user account as long as there is at least one ADMIN account left on the radio. If the
user attempts to delete the last ADMIN account on the radio (and click Save), an error popup shall be
displayed.
To change a Password:
1. Select Terminal Settings > Security > Users
2. Click on the Select button for the user you wish to change the Password.
3. Enter the Password.
4. Click Save.
The One-time Password Recovery is a future proofing mechanism that allows an Admin user access to change
the Admin password if the Admin user is permanently locked out or the Admin password is unknown. OTP
passwords can be entered on this page and then saved in a text file for future use.
If these passwords are used to login to a radio, the password is immediately changed so it can’t be used
again.
Recovery Method
Option Function
Standard OTP Using the ‘Standard OTP’ password when logging into a radio,
allows the user to change the radio Admin password so it can then
be used to login and access the radio.
Standard and Factory OTP Using the ‘Standard and Factory OTP password’ when logging into a
radio, allows the user to change the radio Admin password BUT
also restores the entire radio to Factory Defaults so be careful
using this!
Whenever new passwords are generated for a user, a popup box shall be displayed with the new passwords
in clear text.
The Copy button copies the generated passwords to the clipboard, for storage in a text file for future use.
In addition to web-based management (SuperVisor), the network can also be managed using the Simple
Network Management Protocol (SNMP) using any version of SNMP v1/2/3. MIB files are supplied, and these
can be used by a dedicated SNMP Manager, such as Castle Rock’s SNMPc, to access most of the radio’s
configurable parameters.
For communication between the SNMP manager and the radio, Access Controls and Community strings must
be set up as described in the following sections.
A SNMP Community String is used to protect against unauthorized access (similar to a password). The SNMP
agent (radio or SNMP manager) will check the community string before performing the task requested in the
SNMP message.
Read Only
The default Read Only community string is public.
Read Write
The default ReadWrite community string is private.
The SNMP manager community strings must be setup to access the base station and remote / repeater
stations.
To access the base station, a community string must be setup on the SNMP manager the same as the
community string setup on the radio (see ‘Security > SNMP’ on page 248).
SNMP access to remote / repeater stations can be achieved by using the radio’s IP address and the normal
community string or by proxy in the base station.
The SNMP Proxy Support must be enabled for this method of SNMP access to operate (see ‘SNMP Proxy
Support’ on page 232).
Alternatively, for Admin level only, for a RADIUS server to respond to the radio, it must be configured with
attributes Service-Type (6) = Administrative (6) which will grant the user admin access to the radio.
A RADIUS server can act as a proxy client to other RADIUS servers or other kinds of authentication servers.
Option Function
Local Authentication No radius Authentication – allows any local user privilege
Radius Authentication Only radius Authentication – no local user privilege
Radius Authentication Uses radius Authentication if it is available.
and Local admin If radius Authentication is not available, uses local Admin login
Radius Then Local If the user is not authenticated in the radius server, it allows any
Authentication local user privilege.
Local Then Radius If the user is not allowed in the local user privilege, radius
Authentication authentication is used.
Primary Server
This parameter sets which radius server is used as the primary server for authentication. Select one of the
possible authentication servers setup in Radius Server Settings.
Secondary Server
This parameter sets which radius server is used as the secondary server for authentication. Select one of
the possible authentication servers setup in Radius Server Settings.
Primary Server
This parameter sets which radius server is used as the primary server for accounting (log of user activity).
Select one of the possible accounting servers setup in Radius Server Settings.
Secondary Server
This parameter sets which radius server is used as the secondary server for accounting. Select one of the
possible accounting servers setup in Radius Server Settings.
Option Function
Ignore and Authenticate Ignore the unknown attributes and accept the authentication
received from the radius server
Reject and Deny Reject the authentication received from the radius server
Server Name
You can enter up to four radius servers 1-4.
IP Address
The IP address of the Radius server.
Port Number
The Port Number of the Radius server. RADIUS uses UDP as the transport protocol.
• UDP port 1812 is used for authentication / authorization
• UDP port 1813 is used for accounting.
Old RADIUS servers may use unofficial UDP ports 1645 and 1646.
Encryption Key
The password of the Radius server.
When the password is changed, you will be prompted for confirmation of the password to avoid mistypes.
Profile Name
This parameter shows the predefined security profile active on the radio.
Status
This parameter displays the status of the predefined security profile on the radio (always active).
Profile Name
This parameter displays the security profile that was active on the radio prior to the current profile being
activated.
Status
This parameter displays the status of the security profile that was active on the radio prior to the current
profile being activated.
Option Function
Active The security profile is active on the radio.
Inactive The security profile is not active on the radio but could be
activated if required.
Activate
This parameter activates the previous security profile (restores to previous version).
Profile Name
This parameter displays the new security profile that could be activated on the radio or distributed to all
remote radios with Security > Distribution.
Status
This parameter displays the status of the new security profile.
Option Function
Unavailable A predefined security profile is not available on this radio.
To create a predefined security profile, go to ‘Security > Setup’ on
page 227.
Available A predefined security profile is available on this radio for
distribution and activation.
Status
This parameter shows if a predefined security profile is available for distribution to remote radios.
Option Function
Unavailable A predefined payload security profile is not available on this radio.
Available A predefined payload security profile is available on this radio for
distribution and activation.
Start Transfer
This parameter when activated distributes (broadcasts) the new payload security profile to all remote radios
in the network.
Note: The distribution of the payload security profile to remote radios does not stop customer traffic from
being transferred.
Payload security profile distribution traffic is classified as ‘management traffic’ but does not use the
Ethernet management priority setting. Security profile distribution traffic priority has a fixed priority setting
of ‘very low’.
Note: This process could take up to 1 minute per radio depending on channel size, Ethernet Management
Priority setting and the amount of customer traffic on the network.
2. When the distribution is completed, activate the software with the Remote Payload Security Profile
Activation.
When the security profile has been distributed to all the remote radios, the security profile is then activated
in all the remote radios with this command.
The base station will always attempt to distribute the profile successfully. This broadcast distribution has
its own retry mechanism. The user can find out if all the remote radios have the latest profile when the
managed activation process is attempted. A pop up confirmation will be shown by SuperVisor with relevant
information and the user can decide to proceed or not. The user can attempt to redistribute again if needed.
If the decision is made to continue, on completion of the activation process, communication with the remote
radios that did not have the new security profile will be lost.
Note: Do not navigate SuperVisor away from this page during the activation process (SuperVisor can lose PC
focus).
The remote radios will be polled to determine which radios require activation:
Result Function (X of Y)
Remote Radios Polled for X is the number of radios polled to determine if the radio contains
New Profile the new security profile.
Y is the number of remote radios registered with the base station.
Remote Radios Activated X is the number of radios activated.
Y is the number of radios with the new security profile requiring
activation.
Remote Radios On New X is the number of radios activated and on the new security
Profile profile.
Y is the number of radios with the new security profile that have
been activated.
Maintenance
GENERAL
Local Status Polling Period (sec)
This parameter displays the rate at which SuperVisor refreshes the Local Radio alarm LED states and RSSI
value.
Frequency Tracking
This parameter displays if Frequency Tracking is enabled or disabled.
NETWORK
Node Registration Retry (sec)
This parameter displays the base station poll time at startup or the remote / repeater station time between
retries until registered.
UPGRADE
USB Boot Cycle Upgrade
This parameter shows the type of USB Boot Cycle upgrade defined in ‘Software Setup > USB Boot Upgrade’
on page 292.
TEST MODE
Packet Response Timeout (ms)
This parameter displays the time Test Mode waits for a response from the base station before it times out
and retries.
LICENCE
Remote Management
This parameter displays if Remote Management is enabled or disabled. The default setting is enabled.
SNMP Management
This parameter displays if SNMP management is enabled or disabled. The default setting is enabled.
GENERAL
Local Status Polling Period (sec)
This parameter sets the rate at which SuperVisor refreshes the Local Radio alarm LED states and RSSI value.
The default setting is 10 seconds.
REBOOT
To reboot the radio:
3. Click ‘Save’ to apply the changes or ‘Cancel’ to restore the current value.
TRANSMITTER
CW Test Mode
When active, the transmitter outputs a continuous wave signal.
Option Function
Preamble This mode operates the transmitter in CW mode at the
preamble power level based on the set transmitter power.
PEP This mode operates the transmitter in CW mode at the Peak
Envelope Power (PEP) level based on the set transmitter
power. This test mode is used to demonstrate the full power
capability of the radio.
To demonstrate the maximum PEP power, set the
transmitter power to the maximum power level supported by
the modulation selected.
ACM Lock
This parameter sets whether adaptive modulation can be locked or not.
Option Function
Disable Disables manual locking of the adaptive modulation i.e. allows for
automatic adaptive modulation.
Enable Allows the adaptive modulation to be manually locked
Timer Allows the adaptive modulation to be manually locked but only for
a predetermined period.
ACM Lock To
This parameter manually locks the adaptive modulation.
Option Function
Default Manually locks the adaptive modulation to the default modulation
defined in ‘Default Modulation’ on page 140.
Current Manually locks the adaptive modulation to the current modulation
at that time.
Duration (s)
This parameter defines the period required for manually locking the adaptive modulation. When this period
elapses, the adaptive modulation becomes automatic.
FEC DISABLE
FEC Disable
This diagnostic function allows the user to temporarily disable forward error correction on the channel when
diagnosing problems on the link.
Therefore, enabling this diagnostic function would temporarily disable FEC on the channel and the
associated maintenance mode alarm would activate.
Note that the opposite is not true for this diagnostic function. In other words, this diagnostic function does
not provide the user with the option to temporarily enable forward error correction on the channel.
All diagnostic functions are not persistent and will be return to disabled states should the system restart.
Option Function
Enable Enables the FEC Disable diagnostic function
Disable Disables the FEC Disable diagnostic function
Timer Allows the FEC to be disabled but only for a predetermined period.
Duration (s)
This parameter defines the period required for disabling of the FEC. When this period elapses, the FEC is
enabled.
DEFAULTS
The Maintenance Defaults page is only available for the local terminal.
Maintenance > RF
Profile Lock
This parameter enables / disables the RF Profile manual lock.
Option Function
Disable Disables the RF Profile manual lock so it can be changed by any
predefined Event Action.
Enable Enables the RF Profile manual lock so it cannot be changed by any
predefined Event Action. The RF Profile is selected with the Profile
Lock To.
Timer Enables the RF Profile manual lock but only for a period defined in
Duration.
Profile Lock To
This parameter manually locks the RF Profile to a specific profile, so it cannot be changed by any predefined
Event Action see Events > Event Action Setup on page 286.
Duration (s)
This parameter defines the period to apply a manual RF Profile lock. When this period elapses, the RF Profile
lock becomes Disabled.
ATPC DISABLE
ATPC Disable
This parameter enables / disables ATPC.
Option Function
Off Enables ATPC for all RF Profiles that have it set.
On Disables ATPC for all RF Profiles.
Timer Disables ATPC for all RF Profiles but only for a period defined in
Duration.
Duration (s)
This parameter defines the period to apply ATPC disable. When this period elapses, the ATPC becomes
Enabled for all RF Profiles that have it set.
LICENCE
Fully Featured Radio
When a fully featured Aprisa SR+ radio is purchased (indicated by the AA), it contains the licences which
activate Remote Management, Ethernet Traffic, and SNMP Management e.g.
In this software version, Remote Management, Ethernet Traffic and SNMP management are enabled by
default.
MAINTENANCE FILES
There are three maintenance file types which can saved / restored to / from PC or USB flash drive:
• Configuration Settings
• Event History Log
• Performance History Log
Note: 4RF radios only support the FAT32 file system for flash drives. If the flash drive is a different format
such as exFAT or NTFS, you will need to reformat it to FAT32.
Also, some brands of USB flash drives may not work with 4RF radios.
This feature enables the configuration of a radio to be saved to a file for configuration backup or for copying
to another radio, however the target radio being restored must be operating on the same software version
as the source radio the configuration file was saved from e.g. if the configuration file was saved from a
radio operating on software version 1.11.1, it can only be restored to a radio operating on software version
1.11.1.
Action
Action Option
Save to PC This saves the file with a filename of ‘Config.4’ to a binary
encrypted file. This can then be saved from the Browser popup
(example is Windows Internet Explorer 11). The file should be
renamed to be able to identify the radio it was saved from.
Save to Radio USB This saves the file with a filename of ‘asrcfg_1.11.1’ to a binary
encrypted file on the radio USB flash drive root directory.
Restore from PC This restores all user configuration settings from a binary
encrypted file on a PC directory to the radio.
A reboot warning message will warn of a pending reboot after the
PC file is selected. Clicking OK will open a browser file selection
window to select the file.
Note: If you are using Explorer, it must be IE10 or above for this
feature to work correctly.
Restore from Radio USB This restores all user configuration settings from a binary
encrypted file on the USB root directory to the radio.
Note: ‘Payload Encryption Key’ and ‘Key Encryption Key’ parameters (see ‘Security > Setup’) are not saved
to the configuration file. When a ‘Restore from PC’ or ‘Restore from Radio USB’ is used, these parameters
will retain their existing values so are not changed by the operation of restoring the configuration file.
Note: If the remote radios are running software versions prior to 1.7.3, the configuration file cannot be
downloaded over the air.
Action Option
Save to PC This saves the Event History Log file with a filename of
‘Info.tar.gz’ to a binary encrypted file. This can then be saved
from the Browser popup (example is Windows Internet Explorer
11). The file should be renamed to be able to identify the radio it
was saved from.
The ‘tar.gz’ file is normally for sending back to 4RF Limited for
analysis but can be opened with widely available archive tools e.g.
WinRar or 7-ZIP.
Save to Radio USB This saves the file with a filename of e.g.
‘alarm_173.10.1.30_2014-11-10,15.54.14.txt’ to a text file on the
radio USB flash drive root directory.
Action Option
Save to PC This saves the Performance History Log file with a filename of
‘Perf.tar.gz’. This can then be saved from the Browser popup
(example is Windows Internet Explorer 11). The file should be
renamed to be able to identify the radio it was saved from.
The ‘tar.gz’ file is normally for sending back to 4RF Limited for
analysis but can be opened with widely available archive tools e.g.
WinRar or 7-ZIP.
4RF has developed templates for viewing the data from the Performance Log files. These templates include
the instructions for importing and graphing the log data.
The Performance History Log Templates are available in a zip file from the 4RF website
https://www.4rf.com/secure (login required) > Aprisa SR+ > Support Tools or from 4RF.
These templates import the data from the saved csv files and generate tables and charts of the radio data.
• Unzip the saved perf.tar.gz file to a temporary directory using an open-source file archiver like 7-zip
• Open the performance history template zip file (.zip) and extract the templates (.xlsm) into the
same temporary directory
• Open the template spreadsheet (.xlsm) appropriate to the history you want to review
• On the spreadsheet ‘Instructions’ sheet, click the ‘Import From CSV’ button. The spreadsheet will
now present the raw data from the CSV file in various tables and charts.
Action Option
Load and Execute This loads and executes configuration script files.
There are sample Master Configuration script files available from
the 4RF website https://www.4rf.com/secure.
The purpose of these files is to use as templates to create your
own configuration scripts.
Note: Be careful using this feature as incompatible configurations
will change the radios settings and break radio connectivity.
Note: Activating this function will over-write all existing configuration settings in the radio (except for the
non-saved settings e.g. security passwords, licence keys etc) without any verification of the command
setting in the radio. Precautions should be taken to prevent radio outages with incorrect radio
configurations. The following process steps are recommended:
a. Save the current radio configuration to a PC or USB before uploading the new configuration script
file
b. Upload the new configuration script file to the radio
c. If for some reason the radio doesn’t work as expected, the saved configuration file can be uploaded
to the radio (roll back to previous configuration).
Retain IP Address
This parameter when enabled ensures that the radio IP address is not changed when the radio configuration
settings are restored from a configuration file with a different IP radio address. It prevents the radio losing
connectivity when the configuration settings are restored from a configuration file.
NETWORK
Discover Nodes
This parameter when activated triggers the base station to poll the network with Node Missed Poll Count
and Node Registration Retry values.
Once a remote radio has registered with the Base Station, it will remain in the Network Table regardless of
whether the remote radio is present or not until such time that you manually remove it. If you want to
remove the deinstalled radios from the Network Table, you will need to use the ‘Decommission Node(s)’
command which will clear the entire network table and then the ‘Discover Nodes’ command. This will then
populate the Network Table only with those remote radios that are communicating with the Base Station.
Decommission Node(s)
This parameter when activated resets the network registrations to remove the entire network from service.
Individual nodes can be decommissioned using the ‘registration’ CLI commands see page 395.
Broadcast Time
This parameter when activated sends the base station Date / Time setting to all the remote and repeater
stations in the network and sets their Date / Time. This option applies to the base station only.
GENERAL
Frequency Tracking
Frequency Tracking enables the receiver to track any frequency drift in the transmitter to maintain optimum
SNR and radio link performance over the full temperature range.
When enabled, remote radios adjust their receive frequency to the frequency of the incoming packet rate
and the base station notifies remote radios if their transmit frequency requires adjustment.
The default setting is Enabled.
Events
The Events menu contains the setup and management of the alarms, alarm events and traps.
2. Informational Events
Informational Events are generated to provide information on key activities that are occurring on the radio.
These events do not indicate an alarm on the radio and are used to provide information only.
See ‘Alarm Types and Sources’ on page 454 for a complete list of events.
ALARM SUMMARY
The Alarm Summary is a display tree that displays the current states of all radio alarms. The alarm states
refresh automatically every 12 seconds.
EVENT HISTORY
The last 1500 events are stored in the radio. The complete event history list can be downloaded to a USB
flash drive (see ‘File - Event History Log’ on page 273).
The Event History can display the last 50 events stored in the radio in blocks of 8 events.
The Next button will display the next page of 8 events and the Prev button will display the previous page of
8 events. Using these buttons will disable Auto Refresh to prevent data refresh and page navigation
contention.
The last 50 events stored in the radio are also accessible via an SNMP command.
Auto Refresh
The Event History page selected will refresh automatically every 12 seconds if the Auto Refresh is ticked.
EVENTS SETUP
Alarm event parameters can be configured for all alarm events (see ‘Alarm Events’ on page 455).
All active alarms for configured alarm events will be displayed on the Monitoring pages (see ‘Monitoring’ on
page 308).
This Switch and Block parameters are only visible / applicable when the radio is part of a Protected Station.
Severity
The Severity parameter sets the alarm severity.
Severity Function
Critical The Critical severity level indicates that a service affecting condition has occurred and an
immediate corrective action is required. Such a severity can be reported, for example,
when a managed object becomes totally out of service and its capability must be restored.
Major The Major severity level indicates that a service affecting condition has developed and an
urgent corrective action is required. Such a severity can be reported, for example, when
there is a severe degradation in the capability of the managed object and its full capability
must be restored.
Minor The Minor severity level indicates the existence of a non-service affecting fault condition
and that corrective action should be taken in order to prevent a more serious (for
example, service affecting) fault.
Such a severity can be reported, for example, when the detected alarm condition is not
currently degrading the capacity of the managed object.
Warning The Warning severity level indicates the detection of a potential or impending service
affecting fault, before any significant effects have been felt. Action should be taken to
further diagnose (if necessary) and correct the problem in order to prevent it from
becoming a more serious service affecting fault.
Information No problem indicated – purely information
Suppress
This parameter determines if the action taken by an alarm.
Option Function
None Alarm triggers an event trap and is logged in the radio
Traps Alarm is logged in the radio but does not trigger an event trap
Traps and Log Alarm neither triggers an event trap nor is logged in the radio
Units (1)
The Units parameter shows the unit for the Lower Limit and Upper Limit parameters.
Duration
This parameter determines the period to wait before an alarm is raised if no data is received.
Units (2)
This parameter shows the unit for the Duration parameters.
Switch
This parameter determines if the alarm when active causes a switch over of the Protection Switch.
This parameter is only applicable when the radio is part of a Protected Station.
Block
This parameter determines if the alarm is prevented from causing a switch over of the Protection Switch.
This parameter is only applicable when the radio is part of a Protected Station.
The Next button will display the next page of 8 alarm events and the Prev button will display the previous
page of 8 alarm events.
TRAPS SETUP
All events can generate SNMP traps. The types of traps that are supported are defined in the ‘Notification
Mode’.
Destination Address
This parameter sets the IP address of the server running the SNMP manager.
Port
This parameter sets the port number the server running the SNMP manager.
Community String
This parameter sets the community string which is sent with the IP address for security. The default
community string is ‘public’.
Notification Mode
This parameter sets when an event related trap is sent:
Option Function
None No event related traps are sent.
Event Recorded When an event is recorded in the event history log, a trap is sent.
Event Updated When an event is updated in the event history log, a trap is sent.
All Events When an event is recorded or updated in the event history log, a
trap is sent.
Notification Type
This parameter sets the type of event notification:
Option Function
Standard Trap Provides a standard SNMP trap event
Inform Request Provides a SNMP v2 Inform Request trap event including trap retry
and acknowledgement
Maximum Retries
This parameter sets the maximum number of retries to send the event without acknowledgement before it
gives up.
Enabled
This parameter determines if the entry is used.
ALARM PORTS
This page provides control of the two hardware alarm inputs and two hardware alarm outputs provided on
the alarm connector.
The alarm inputs are used to transport alarms to the other radios in the network. The alarm outputs are
used to receive alarms from other radios in the network.
These alarms are only available when the station is non protected.
Name
The alarm IO number.
Type
The Type shows if the alarm is an input or output.
Active State
The Active State parameter sets the alarm state when the alarm is active.
Alarm Input
Option Function
Low The alarm is active low i.e. a ground contact on the port will cause
an active alarm state
High The alarm is active high i.e. an open contact on the port will cause
an active alarm state
Alarm Output
Option Function
Low The alarm is active low i.e. the active alarm state will generate a
ground contact output
High The alarm is active high i.e. the active alarm state will generate a
open contact output
Current State
The Current State shows the current state of the alarm.
This page provides control of the mapping of events to specific actions. Specific alarm events can setup to
trigger outputs.
Action Definition
This parameter shows the number of the event action setup and the maximum number of setups stored.
Action Type
This parameter sets the action type that will be activated on the radio for the condition defined in Action
Threshold Criteria.
Option Function
None This action setup does not activate any alarm output
Activate RF Profile 1 or 2 This action setup activates the RF Profile 1 or 2 (whichever is
inactive)
Activate Alarm Output 1 This action setup activates alarm output 1
Activate Alarm Output 2 This action setup activates alarm output 2
Option Function
None No action output.
Radio Severity Equal Critical Activates the action output when a radio alarm is critical
alarm
Radio Severity Equal Major Activates the action output when a radio alarm is a major
alarm
Radio Severity Equal Minor Activates the action output when a radio alarm is minor
alarm
Radio Severity Equal Warning Activates the action output when a radio alarm is a
warning alarm
Radio Severity Equal Cleared Activates the action output when a radio alarm is cleared
Radio Severity Equal or Worse than Activates the action output when a radio alarm is a major
Major alarm or a critical alarm
Radio Severity Equal or Worse than Activates the action output when a radio alarm is a minor
Minor alarm, a major alarm or a critical alarm
Radio Severity Equal or Worse than Activates the action output when a radio alarm is a
Warning warning, a major alarm, a minor alarm or a critical alarm
Controls
The Save button saves the current event action setup.
The Cancel button cancels the new event action setup.
The Add button adds a new event action setup.
The Delete button deletes the current event action setup.
The Clear Map button clears all alarm selections on the current setup.
EVENT DEFAULTS
Restore Defaults
This parameter when activated restores all previously configured event parameters using ‘Events > Events
Setup’ to the factory default settings.
Software
The Software menu contains the setup and management of the system software including network software
distribution and activation. The distribution of the system software to the remote radios is encrypted by
the AES session key over-the-air.
1. Transfer the new software to base station with ‘Software > File Transfer’
2. Distribute the new software to all remote radios with ‘Software > Remote Distribution’
3. Activate of the new software on remote radios with ‘Software > Remote Activation’.
4. Finally, activate the new software on the base station radio with ‘Software > Manager’. Note: activating
the software will reboot the radio.
SOFTWARE VERSIONS
Current Version
This parameter displays the software version running on the radio.
Previous Version
This parameter displays the software version that was running on the radio prior to the current software
being activated.
FILE TRANSFER
Transfer Activity
This parameter shows the status of the transfer, ‘Idle’, ‘In Progress’ or ‘Completed’.
Method
This parameter shows the file transfer method. When the software distribution is in progress, this parameter
will change to ‘Over the Air’ (from xx.xx.xx.xx) to show that the interface is busy and the transfer is in
progress.
File
This parameter shows the software file source.
Transfer Result
This parameter shows the progress of the transfer.
USB SETUP
USB Boot Upgrade
This parameter determines the action taken when the radio power cycles and finds a USB flash drive in the
Host port. The default setting is ‘Load Only’.
Option Function
Load and Activate New software will be uploaded from a USB flash drive in to the
Aprisa SR+ when the radio is power cycled and activated
automatically.
Load Only New software will be uploaded from a USB flash drive in to the
Aprisa SR+ when the radio is power cycled. The software will need
to be manually activated (see ‘Software > Manager’ on page 297).
Disabled Software will not be uploaded from a USB flash drive into the
Aprisa SR+ when the radio is power cycled.
Note: This parameter must be set to ‘Disabled’ if the ‘File Transfer and Activate’ method of upgrade is
used. This ‘Disabled’ setting prevents the radio from attempting another software upload when the radio
boots (which it does automatically after activation).
Direction
This parameter sets the direction of file transfer. In this software version, the only choice is ‘To the Radio’.
Method
This parameter sets the method of file transfer.
Option Function
USB Transfer Transfers the software from the USB flash drive to the radio.
FTP Transfers the software from an FTP server to the radio.
HTTP / HTTPS Transfers the software directly from a PC software pack file to the
radio.
File
This parameter shows the software file source.
FTP Username
This parameter sets the Username to access the FTP server.
FTP Password
This parameter sets the Password to access the FTP server.
Direction
This parameter shows the direction of file transfer. In this software version, the only choice is ‘To The
Radio’.
Method
This parameter shows the file transfer method.
File
This parameter shows the software file source.
Transfer Result
This parameter shows the progress of the transfer:
4. When the transfer is completed, remove the USB flash drive from the host port. If the SuperVisor ‘USB
Boot Upgrade’ setting is set to ‘Disabled’ (see ‘USB Boot Upgrade’ on page 292), the USB flash drive
doesn’t need to be removed as the radio won’t try to load from it.
Go to Supervisor > Software > Manager and activate the Software Pack (see ‘Software > Manager’ on page
297). The radio will reboot automatically.
If the file transfer fails, check the Event History page (see ‘Events > Event History’ on page 279) for more
details of the transfer.
Note: 4RF radios only support the FAT32 file system for flash drives. If the flash drive is a different format
such as exFAT or NTFS, you will need to reformat it to FAT32.
Also, some brands of USB flash drives may not work with 4RF radios.
FTP Method
1. Unzip the software release files into a temporary directory.
2. Open the FTP server and point it to the temporary directory.
3. Enter the FTP server IP address, Username and password into SuperVisor.
4. Click on ‘Start Transfer’.
Go to Supervisor > Software > Manager and activate the Software Pack (see ‘Software > Manager’ on page
297). The radio will reboot automatically.
If the file transfer fails, check the Event History page (see ‘Events > Event History’ on page 279) for more
details of the transfer.
Go to Supervisor > Software > Manager and activate the Software Pack (see ‘Software > Manager’ on page
297). The radio will reboot automatically.
If the file transfer fails, check the Event History page (see ‘Events > Event History’ on page 279) for more
details of the transfer.
CURRENT SOFTWARE
Version
This parameter displays the software version running on the radio.
Status
This parameter displays the status of the software version running on the radio (always active).
PREVIOUS SOFTWARE
Version
This parameter displays the software version that was running on the radio prior to the current software
being activated.
Status
This parameter displays the status of the software version that was running on the radio prior to the current
software being activated.
Option Function
Active The software is operating the radio.
Inactive The software is not operating the radio but could be re-activated if
required.
Activate
This parameter activates the previous software version (restores to previous version).
The Aprisa SR+ will automatically reboot after activation.
SOFTWARE PACK
Version
This parameter displays the software pack version available for distribution on base station and activate on
all stations.
Status
This parameter displays the status of the software pack version.
Option Function
Available On the base station, the software pack is available for distribution.
On all stations, the software pack is available for activation.
Activating The software pack is activating in the radio.
Unavailable There is no software pack loaded into the radio.
Activate
This parameter activates the software pack.
The Aprisa SR+ will automatically reboot after activation.
Activation Type
This parameter sets when the software pack activation will occur.
Option Function
Now Activates the software pack now.
Date & Time Activates the software pack at the Date & Time set in the following
parameter.
If the network base station radio date / time is not synchronized, you will get the following popup:
You can manually enter the base station radio date / time or use the Date And Time Synchronization from
a SNTP server feature (see ‘Terminal > Date / Time’ on page 116).
Status
This parameter displays the status of the software pack version.
If a Software Pack is not available, the status will display ‘Unavailable’ and the software distribution
mechanism will not work.
Start Transfer
This parameter when activated distributes (broadcasts) the new Software Pack to all remote radios in the
network.
Note: The distribution of software to remote radios does not stop customer traffic from being transferred.
However, due to the volume of traffic, the software distribution process may affect customer traffic.
Software distribution traffic is classified as ‘management traffic’ but does not use the Ethernet management
priority setting. Software distribution traffic priority has a fixed priority setting of ‘very low’.
Note: This process could take anywhere between 40 minutes and several hours depending on channel size,
Ethernet Management Priority setting and the amount of customer traffic on the network.
3. When the distribution is completed, activate the software with the Remote Software Activation.
Pause Transfer
This parameter when activated, pauses the distribution process and shows the distribution status. The
distribution process will continue from where it was paused with Resume Transfer.
Cancel Transfer
This parameter when activated, cancels the distribution process immediately.
During the distribution process, it is possible to navigate away from this page and come back to it to check
progress. The SuperVisor session will not timeout.
Version
This parameter displays the software version for activation. The default version is the software pack version
but any valid software version can be entered in the format ‘n.n.n’.
Activation Type
This parameter sets when the software pack activation will occur.
Option Function
Now Activates the software pack now.
Date & Time Activates the software pack at the Date & Time set in the following
parameter.
Note: Do not navigate SuperVisor away from this page during the activation process (SuperVisor can lose PC
focus).
1. Enter the Software Pack version (if different from displayed version).
The remote radios will be polled to determine which radios require activation:
Result Function (X of Y)
Remote Radios Polled for X is the number of radios polled to determine the number of
Partners protected stations in the network.
Y is the number of remote radios registered with the base station.
Remote Radios Polled for X is the number of radios polled to determine the number of radios
New Version that contain the new software version.
Y is the number of remote radios registered with the base station.
Remote Radios Activated X is the number of radios that contain the new software version
and have been activated.
Y is the number of radios that contain the new software version
and can be activated.
Remote Radios On New X is the number of radios that has been successfully activated and
Version now running the new version of software.
Y is the number of radios that the activation command was
executed on.
Note: When upgrading from software version 1.2.5 to 1.2.6 or
later, communication to all remote radios will be lost due to a MAC
protocol change. This will prevent this function from working
correctly. In this case, activate the new software on the base
station and run the ‘Maintenance > Advanced’ Discover Nodes
function on page 276.
The example shows that during the activation process there were exceptions that may need to be
investigated.
When all the remote radios have been activated, the base station radio must now be activated with (see
‘Software > Manager’ on page 297).
Activation Type
This parameter sets when the remote software activation will occur.
Option Function
Now Activates the remote software now.
Date & Time Activates the remote software at the Date & Time set in the
following parameter.
You can manually enter the base station radio date / time or use the Date And Time Synchronization from
a SNTP server feature (see ‘Terminal > Date / Time’ on page 116).
Monitoring
The Terminal, Serial, Ethernet, Radio and User Selected Monitored Parameter results have history log views
for both Quarter Hourly and Daily.
Monitored parameter data is accumulated into 2 sets:
• 15 minutes of data, for 96 readings for the last 24 hours
• 24 hours of data, for 31 readings for the last 31 days.
Current VDC Power Supply Parameter to show the current power 10 to 30 VDC
supply input voltage
Current 3.3 Volts Power Parameter to show the current 3.3 volt 3.1 to 3.5 VDC
Supply power rail voltage
Current 5.0 Volts Power Parameter to show the current that the 4.7 to 5.5 VDC
Supply current 5.0 volt power rail voltage
Current 7.2 Volts Power Parameter to show the current that the 6.9 to 7.5 VDC
Supply current 7.2 volt power rail voltage
Current 15 Volts Power Parameter to show the current that the 320, 400 and 450 MHz
Supply current 15 volt power rail voltage. 14.5 to 15.3 VDC
The 15 volt power supply is used to power 135, 220, 896 and 928 MHz
the transmitter driver and power amplifier. 12.7 to 13.5 VDC
Controls
The History Quarter Hourly button presents a log of results every quarter of an hour.
Maximum Capacity Parameter to show the maximum serial Equal to the serial port baud rate setting
data rate of the serial port
Packets Transmitted Parameter to show the number of packets
transmitted to the customer from the serial
port
Packets Received Parameter to show the number of packets
received from the customer into the serial
port
Bytes Received Parameter to show the number of bytes
received from the customer into the serial
port
Errored Bytes Received Parameter to show the number of bytes
received from the customer into the serial
port that have errors
Dropped Bytes (Congestion) Parameter to show the number of bytes
received from the customer into the serial
port that are dropped due to over the air
congestion
Controls
The Reset button clears the current results.
Maximum Capacity Parameter to show the maximum Ethernet Equal to the Ethernet port speed setting
data rate of the Ethernet port
Packets Parameter to show the number of packets
transmitted to the customer from the
Ethernet port
Bytes Parameter to show the number of bytes
transmitted to the customer from the
Ethernet port
Packet Collisions Parameter to show the number of packet
collisions on the data transmitted to the
customer from the Ethernet port on a
shared LAN
VLAN Frames Parameter to show the number of VLAN
tagged frames transmitted to the customer
from the Ethernet port
Controls
The Reset button clears the current results.
The History QHourly button presents a graph of results every quarter of an hour.
This page displays the current radio performance monitoring parameters per Ethernet port received (RX)
data in packet and byte level granularity, for Ethernet port high level statistics and troubleshooting.
The results shown are since the page was opened and are updated automatically every 12 seconds.
Packets Parameter to show the number of packets received from the customer into the Ethernet
port (including broadcasts, multicasts, unicasts, FCS/CRC error, alignment error,
undersize, jabber, oversize, and fragments)
Bytes Parameter to show the number of bytes received from the customer into the Ethernet port
(including broadcasts, multicasts, unicasts, FCS/CRC error, alignment error, undersize,
jabber, oversize, and fragments and excluding IFG framing bytes/bits)
Packets equal to 64 bytes Parameter to show the number of packets received from the customer into the Ethernet
port that are equal to 64 bytes (including broadcasts, multicasts, unicasts, FCS/CRC error,
alignment error, undersize, jabber, oversize, and fragments)
Packets 65 to 127 bytes Parameter to show the number of packets received from the customer into the Ethernet
port that are between 65 and 127 bytes (including broadcasts, multicasts, unicasts,
FCS/CRC error, alignment error, undersize, jabber, oversize, and fragments)
Packets 128 to 255 bytes Parameter to show the number of packets received from the customer into the Ethernet
port that are between 128 and 255 bytes (including broadcasts, multicasts, unicasts,
FCS/CRC error, alignment error, undersize, jabber, oversize, and fragments)
Packets 256 to 511 bytes Parameter to show the number of packets received from the customer into the Ethernet
port that are between 256 and 511 bytes (including broadcasts, multicasts, unicasts,
FCS/CRC error, alignment error, undersize, jabber, oversize, and fragments)
Packets 512 to 1023 bytes Parameter to show the number of packets received from the customer into the Ethernet
port that are between 512 and 1023 bytes (including broadcasts, multicasts, unicasts,
FCS/CRC error, alignment error, undersize, jabber, oversize, and fragments)
Packets 1024 to 1536 bytes Parameter to show the number of packets received from the customer into the Ethernet
port that are between 1024 and 1536 bytes (including broadcasts, multicasts, unicasts,
FCS/CRC error, alignment error, undersize, jabber, oversize, and fragments)
Broadcast Packets Parameter to show the number of broadcast packets received from the customer into the
Ethernet port. Broadcast packets are good packets received that were directed to the
broadcast address. Note that this does not include multicast packets.
Multicast Packets Parameter to show the number of multicast packets received from the customer into the
Ethernet port. Multicast packets are packets that were directed to a multicast address.
Note that this number does not include packets directed to the broadcast address.
VLAN Frames Parameter to show the number of VLAN tagged frames received from the customer into
the Ethernet port, including filtering, congestion but excludes VLAN dropped packets.
VLAN Frames Dropped Parameter to show the number of VLAN tagged frames received from the customer into
the Ethernet port that were dropped due to filtered VLAN frames (filtering configuration
in VLAN configuration). L3 filtered packets, bad packets or congestion dropped packets
are not counted in this parameter.
Packet In Error Parameter to show the number of errored packets received from the customer into the
Ethernet port caused by CRC errors, FCS Errors, alignment errors, oversized packets,
undersized packets, fragmented packets and jabber packets.
Bytes In Error Parameter to show the number of errored bytes received from the customer into the
Ethernet port.
CRC / Alignment Error Parameter to show the number of CRC / alignment errors received from the customer into
the Ethernet port. CRC / alignment errors are defined as frames that had a length
excluding framing bits, but including FCS octets of between 64 and 1518 octets, inclusive,
but had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS
Error) or a bad FCS with a non-integral number of octets.
Undersized Packets Parameter to show the number of undersized packets received from the customer into the
Ethernet port. Undersized packets are less than 64 octets long excluding framing bits, but
including FCS octets.
Oversized Packets Parameter to show the number of oversized packets received from the customer into the
Ethernet port. Oversized packets are longer than 1518 octets excluding framing bits, but
including FCS octets.
Fragmented Packets Parameter to show the number of fragmented packets received from the customer into
the Ethernet port. Fragmented packets have either a bad Frame Check Sequence (FCS)
with an integral number of octets (FCS Error) or a bad FCS.
Jabber Packets Parameter to show the number of jabber packets received from the customer into the
Ethernet port.
Dropped Packets Parameter to show the number of dropped packets received from the customer into the
(congestion) Ethernet port due to congestion i.e., when the Ethernet port 125 packet buffers are full,
the next received packet on the ingress Ethernet port will be dropped.
Dropped Packets (filtering) Parameter to show the number of dropped packets received from the customer into the
Ethernet port caused by packet L2 / L3 filtering.
Dropped Bytes (filtering) Parameter to show the number of dropped bytes received from the customer into the
Ethernet port caused by packet L2 / L3 filtering.
Controls
The Reset button clears the current results.
The History QHourly button presents a log of results every quarter of an hour.
The Graph QHourly button presents a graph of results every quarter of an hour.
RADIO PARAMETERS
Transmitter
Last TX Packet Forward Parameter to show the actual transmitter This value will be dependent on the output
Power power in dBm. The value is stored from the power, the ATPC setting, the temperature
last time the transmitter was active and and the VSWR of the antenna. The alarm
transmitted a packet. limits for the Tx forward power are +/-4
dB.
Last TX Packet Reverse Parameter to show the reflected power. The value will be dependent on the
Power (note 1) The value is stored from the last time the impedance presented to that antenna port
transmitter was active and transmitted a of the radio by the feeder and antenna
packet. system. A reflected power of 15 dB below
the transmit power shows an acceptable
performance.
Last TX Packet VSWR Parameter to show numerically how well This value will be dependent on the feeder
(note 1) the antenna is impedance matched to the and antenna performance, a value of
radio. The value is stored the last time the <1.5:1 shows acceptable performance. A
transmitter was active and transmitted a value of >3.0:1 would indicate that most of
packet. the power is being reflected to the radio
and that there is a fault in the feeder or
antenna.
Current RF TX Duty Cycle Parameter to show the average percentage Dependent on the amount of TX traffic
of the RF channel utilization
Note 1: Currently only some hardware variants are capable of providing this data. If these parameters are
not shown on the Radio Parameters > Transmitter page, the hardware variant is not capable of providing
this data.
Controls
The Reset button clears the current results.
This page displays the current radio performance monitoring parameters of radio receiver.
The results shown are since the page was opened and are updated automatically every 12 seconds.
Receiver
Packets Received Parameter to show the number of packets received over the air without errors
Bytes Received Parameter to show the number of bytes received over the air
Packets Received In Error Parameter to show the number of packets received over the air that contained errors. It
is normal to see this counter increment when ACM is enabled, and a unicast packet is sent
to another radio that supports a faster modulation.
Dropped Packets (filtering) Parameter to show the number of packets dropped because received packets were either
destined for another radio or could not be decrypted. It is normal to see this counter
increment as radios filter out unicast Ethernet or management packets.
Dropped Bytes (filtering) Parameter to show the number of bytes dropped because received packets were either
destined for another radio or could not be decrypted. It is normal to see this counter
increment as radios filter out unicast Ethernet or management packets.
Last RX Packet RSSI Parameter to show the received signal Expected values for a normally operating
strength. radio are between -115 to -10 dBm
Last RX Packet SNR Parameter to show the received signal to Typical values for SNR > 12 dB.
noise ratio. No signal received = 0 dB
Current RF RX Duty Cycle Parameter to show the average percentage Dependent on the amount of RX traffic
of the RF channel utilization
Controls
The Reset button clears the current results.
This page displays the current radio RF transmit path modulation setting to single or multiple destination
radios that the radio is transmitting to.
The results shown are since the page was opened and are updated automatically every 12 seconds.
Transmit Path
Result Function
To The destination IP Address and Node Name of the radio/s transmitting
data to.
Tx Mod The current radio transmitter modulation being used to communicate with
the destination radio/s.
Tx Timestamp The timestamp of the last transmitted packet to the destination radio/s.
Controls
The Next button will display the next page of 8 radios and the Prev button will display the previous page of
8 radios.
This page displays the current radio RF receive path parameters from single or multiple source radios that
the radio is receiving from.
The results shown are since the page was opened and are updated automatically every 12 seconds.
Receive Path
Result Function
From The IP Address and Node Name of the radio receiving data from.
Rx RSSI The RSSI of the RF signal received from the source radio/s. This parameter
displays the receiver RSSI reading taken from the last data packet received.
Rx SNR The SNR of the RF signal received from the source radio/s. This parameter
displays the receiver SNR reading taken from the last data packet received.
Rx Freq Error The frequency difference between this radio’s receiver and the frequency of the
incoming packet rate from the source radio/s.
Rx Mod The current radio receive modulation being used to communicate with the source
radio/s.
Rx Timestamp The timestamp of the last received packet from the source radio/s.
Controls
The Next button will display the next page of 8 radios and the Prev button will display the previous page of
8 radios.
Ethernet Ports
INTERFACE PARAMETERS
Ethernet Ports
Radio Path
Radio Path
NAT In Translations The number of translated packets received on the radio interface
NAT Out Translations The number of translated packets transmitted on the radio interface
NAT Discards The number of translated packets rejected / discarded on the radio interface due to the
lack of resource or other reason
Controls
The Reset button clears the current results.
Result Function
Local Address The local radio IP address
Local Port The local radio TCP port number
Remote Address The remote host IP address (in most case a host PC connected to radio /
network)
Remote Port The local radio TCP port number (in most case a host PC connected to
radio / network)
Controls
The Next button will display the next page of 8 connections and the Prev button will display the previous
page of 8 connections.
If the Auto Refresh option is ticked, the TCP Connections table will refresh every 12 seconds.
ROUTING TABLE
Result Function
Index The routing table index
Destination The target destination IP address of the route
Mask The subnet mask of the destination IP address of the route
Next Hop The next hop IP address on the path to the destination IP address of the
route
Interface The physical interface output on the path to the destination IP address of
the route
Controls
The Next button will display the next page of 8 routes and the Prev button will display the previous page of
8 routes.
If the Auto Refresh option is ticked, the routing table will refresh every 12 seconds.
ADDRESS TABLES
Title Function
IP Address The IPv4 address of a neighboring device in the radio LAN network
MAC Address The ARP result matching or mapping MAC address from the IPv4 address.
Interface The Ethernet port interface the ARP results found the matching/mapping
Type ‘Dynamic’ indicates an ARP result and ‘Static’ indicates a user static
mapping.
Controls
The Next button will display the next page of 8 addresses and the Prev button will display the previous page
of 8 addresses.
If the Auto Refresh option is ticked, the ARP table will refresh every 12 seconds.
ADDRESS TABLES
Title Function
MAC Address The learned MAC address of a neighboring bridge device in the LAN network.
Interface The Ethernet port interface the MAC address has learned
Age left The aging time of this MAC entry will stay in the table, even if this MAC
address is not used. Every time this MAC address is used, the aging time
restarts from its maximum. Default is 300 sec.
Controls
The Next button will display the next page of 8 addresses and the Prev button will display the previous page
of 8 addresses.
If the Auto Refresh option is ticked, the routing table will refresh every 12 seconds.
Title Function
Idle Time (s) The total duration where the session has been idle. Traffic on this
session will reset the Idle Time to zero.
Session Up Time (s) The total duration that this session has been shown in the session table.
Inbound Packets The total number of packets received on the public interface for this
session.
Outbound Packets The total number of packets transmitted from the public interface for
this session.
Network Status
NETWORK TABLE
This Network Table is only available when the local radio is the base station i.e. SuperVisor is logged into
the base station.
Controls
Search
The Search button brings up a search form.
Filtering
The first row of the table in the pop up window is the search filter.
There are two types of filters:
1. Drop down lists with a finite set of options to select from
2. Text entry where any text can be entered.
When the filters are applied, the rows in the rest of the table are displayed only if they match all the filters.
Example 1 - one filter; select ‘remote’ in the ‘Op Mode’ filter with the other drop down list set to ‘All’ and
the text entry filters blank, will show all the remote radios
Example 2 - two filters; type ‘98’ in the MAC Addr filter and select ‘Bridge’ for the ‘Eth Mode’ filter.
Grouping
Entries in the network table can be grouped based on the Segment IDs. The user can expand the groups with
the and collapse the groups with the button to help locate an entry.
Sorting
Clicking on a column header of the table will sort the table by that column.
The Select button closes the popup, updates the selection on the Network Table and saves the search/filter
parameters which are reused the next time the search is initiated in the same SuperVisor session.
The Close button closes the Search popup.
The Expand button expands the group of the selected entry and the Expand All button expands all groups.
The Collapse button collapses the group of the selected entry and the Collapse All button collapses all
groups.
The Reset button removes all filtering and expands all groups.
Network Table
Refreshes the Network table from the currently selected IP address.
External Access
Sets the IP address of an extended network radio for SuperVisor management.
Recent
The Recent dropdown list shows the IP addresses that have been managed recently with the extended
network radio.
NETWORK SUMMARY
A network poll will start when any of the Network Status pages are opened (Summary, Exceptions or View).
The network poll will only continue to poll the remote radios if one of the Network Status pages is open
(SuperVisor can lose PC focus). The network poll continues from where it was stopped last time it was
polling.
The initial result assumes that all remote radios are operating correctly.
Network Summary Example:
Result Function
Network Polling Cycle The number of poll cycles since first opening a Network Status >
Summary, Exceptions or View page.
Remote Radios Polled This shows the number of remote radios polled for the current
polling cycle out of the number of remote radios registered with
the base station.
External Radios Polled This shows the number of extended network radios polled for the
current polling cycle out of the total extended network radios.
Polling Interval The time interval between the completion of one radio poll and
the start of the next radio poll. To set the polling interval, see
‘Maintenance > General’ on page 261.
If a remote radio does not respond to a poll request within 10 seconds, the previous readings from that radio
will be presented. Connectivity to a remote radio will be show as ‘lost’ if the remote radio has not responded
to 3 consecutive poll requests.
NETWORK EXCEPTIONS
A network poll will start when any of the Network Status pages are opened (Summary, Exceptions or View).
The network poll will only continue to poll the remote radios if one of the Network Status pages is open
(SuperVisor can lose PC focus). The network poll continues from where it was stopped last time it was
polling.
Result Function
Network Polling Cycle The number of poll cycles since first opening a Network Status >
Summary, Exceptions or View page.
Remote Radios Polled This shows the number of remote radios polled for the current
polling cycle out of the number of remote radios registered with
the base station.
External Radios Polled This shows the number of extended network radios polled for the
current polling cycle out of the total extended network radios.
Polling Interval The time interval between the completion of one radio poll and
the start of the next radio poll. To set the polling interval, see
‘Maintenance > General’ on page 261.
If a remote radio does not respond to a poll request within 10 seconds, the previous readings from that radio
will be presented. Connectivity to a remote radio will be show as ‘lost’ if the remote radio has not responded
to 3 consecutive poll requests.
If a remote radio on the list is detected to be responding to a poll request and no longer be in an alarmed
state, the entry for this remote radio will be removed from the list.
View Events
Clicking on View Events navigates to the Events page (see ‘Events’ on page 278) for the specific remote
radio where the radio events will be displayed.
View Parameters
Clicking on View Parameters navigates to the Monitoring page (see ‘Monitoring’ on page 308) for the specific
remote radio where the radio parameters will be displayed.
NETWORK VIEW
A network poll will start when any of the Network Status pages are opened (Summary, Exceptions or View).
The network poll will only continue to poll the remote radios if one of the Network Status pages is open
(SuperVisor can lose PC focus). The network poll continues from where it was stopped last time it was
polling.
Result Function
Network Polling Cycle The number of poll cycles since first opening a Network Status >
Summary, Exceptions or View page.
Remote Radios Polled This shows the number of remote radios polled for the current
polling cycle out of the number of remote radios registered with
the base station.
External Radios Polled This shows the number of extended network radios polled for the
current polling cycle out of the total extended network radios.
Polling Interval The time interval between the completion of one radio poll and
the start of the next radio poll. To set the polling interval, see
‘Maintenance > General’ on page 261.
Note: as this polling feature utilizes air time, the polling interval
should be selected to suit the network traffic.
If a remote radio does not respond to a poll request within 10 seconds, the previous readings from that radio
will be presented. Connectivity to a remote radio will be show as ‘lost’ if the remote radio has not responded
to 3 consecutive poll requests.
Events Summary
Clicking on Events Summary navigates to the Events page (see ‘Events > Alarm Summary’ on page 278) for
the specific remote radio where the radio events will be displayed.
Monitored Parameters
Clicking on Monitored Parameters navigates to the Monitoring page (see ‘Monitoring’ on page 308) for the
specific remote radio where the radio parameters will be displayed.
Controls
Add
The Add button adds a radio to the extended network radio list.
An error message will warn the user if the IP address entered is not a radio in the external network.
A maximum of 480 external radios can be added to the monitoring list but only the first 24 radios will be
saved. If the user adds external radios beyond the first 24, an additional informational message will be
displayed in the pop up box to inform the user that these entries will not be saved and will be lost when
logging out of SuperVisor.
Delete
Deletes the selected radio from the extended network radio list.
Protected Station
The majority of SuperVisor screens are the same for the standard radio and the protected station. The
following screens are specific to the protected station.
Parameter Errors
On protected station screens, parameter values displayed in red indicate discrepancies in common
parameter values between the primary and secondary radios (see ‘Protected Station: Terminal > Summary’
on page 341 for an example of the red display). The value displayed is from the ‘addressed radio’.
These value discrepancies can occur if the two protected station radios have been separately configured.
The discrepancies can be corrected by re-entering the values in one of the radios. The value will be copied
to the partner radio.
Terminal
TERMINAL SUMMARY
This page displays the current settings for the Terminal parameters.
PROTECTION INFORMATION
Protection Type
This parameter shows the type of protection:
Option Function
Serial Data Driven Switching Provides radio and RS-232 serial port user interface protection for
Aprisa SR+ radios.
Monitored Hot Standby The RF ports and interface ports from two standard Aprisa SR+
(Protected Station) radios are switched to the standby radio if there is a failure in the
active radio.
The standby radio is monitored to ensure its correct operation
should a switch-over be required. See ‘Monitored Alarms’ on page
409 for the list of monitored alarms.
Redundant The RF ports and interface ports from two standard Aprisa SR+
(Protected Station) radios are switched to the standby radio if there is a failure in the
active radio
Active Unit
This parameter shows the radio which is currently active (Primary or Secondary).
Switch Count
This parameter shows the number of protection switch-overs since the last radio reboot (volatile).
Primary Address
This parameter shows the IP address of the primary radio (usually the left side radio A).
Secondary Address
This parameter shows the IP address of the secondary radio (usually the right side radio B).
OPERATING SUMMARY
TERMINAL DETAILS
OPERATING MODES
Terminal Operating Mode
The Terminal Operating Mode can be set to Base, Base Repeater, Repeater, Remote or Point-To-Point
station. The default setting is Remote.
Option Function
Base The base station manages all traffic activity between itself,
repeaters and remotes. It is the center-point of network where in
most cases will be connected to a SCADA master.
Base Repeater The Base-Repeater has the same function as the base station (and
repeater station), but used when peer to peer connections
between remotes is required via the base station.
Base MMS The Base-MMS has the same function as the base station, but used
when Migration Station operation is required (see Aprisa SR+
Appendix 1 – Migration Station).
Repeater The repeater forwards packets coming from base station and other
repeaters e.g. in daisy chain LBS mode and /or remote radios.
Remote The remote in most cases is used as the end-point of the SCADA
network connected to an RTU or PLC device for SCADA network
control and monitoring.
Point To Point Configures a full duplex radio for point-to-point (PTP) operation.
Changing from PMP or PTP or vice versa requires the radio to be
‘restored to factory default settings’ which will clear all previous
radio setup and configuration.
See ‘Point-To-Point’ section on page 402.
SR Compatible
The SR Compatible option enables over-the–air point-to-multipoint interoperation between an Aprisa SR+
network and New Aprisa SR radios. The default setting is unticked.
When the Aprisa SR+ ‘SR Compatible’ option is activated, the Aprisa SR+ locks its modulation to QPSK (as
per the New Aprisa SR modulation) and disables functionality which is not available in the New Aprisa SR for
full compatibility / interoperability operation.
This compatibility option allows the user a smooth migration to Aprisa SR+ when higher speeds of 120,
60 kbit/s (at 25, 12.5 kHz channel sizes), Adaptive Coding and Modulation, full duplex and more features
are required.
Option Function
Bridge Bridge mode inspects each incoming Ethernet frame source and
destination MAC addresses to determine if the frame is forwarded
over the radio link or discarded.
Gateway Router Gateway Router mode inspects each incoming IP source and
destination IP addresses to determine if the packet is forwarded
over the radio link or discarded. In this mode, all Ethernet
interfaces have the same IP address and subnet.
Router Router mode inspects each incoming IP source and destination IP
addresses to determine if the packet is forwarded over the radio
link or discarded. In this mode, each Ethernet interface has a
different IP address and subnet.
Advanced
Enabled for Gateway Router and Router modes only. The default setting is unticked.
To enable Advanced routing, select the operating mode; Router or Gateway Router and tick the Advanced
checkbox.
Advanced Gateway Router mode (AGRM) or Advanced Router mode (ARM) act like a true router between the
Ethernet ports and RF interface port where the next hop is one of these ports. This means that the RF
interface is a public interface exposed to the user with IP and MAC address like the Ethernet interface.
In AGRM mode, all Ethernet interfaces have the same IP address and subnet.
In ARM mode, each Ethernet interface has a different IP address and subnet.
See ‘Advanced Gateway Router Mode (AGRM) and Advanced Router Mode (ARM)’ on page 40 for a detailed
explanation of advanced router modes.
Note: The Network Address Translation feature works only in Advanced Router or Advanced Gateway Router
operating mode (see ‘IP > NAT’ on page 194).
TERMINAL PROTECTION
Protection Type
The Protection Type defines if a radio is a stand-alone radio or part of an Aprisa SR+ Protected Station. The
default setting is None.
Option Function
None The SR+ radio is a stand-alone radio (not part of an Aprisa SR+
Protected Station).
Redundant The SR+ radio is part of an Aprisa SR+ Protected Station.
(Protected Station) The RF ports and interface ports from two standard Aprisa SR+
radios are switched to the standby radio if there is a failure in the
active radio
Monitored Hot Standby Set to make this SR+ radio part of an Aprisa SR+ Protected Station.
(Protected Station) The RF ports and interface ports from two standard Aprisa SR+
radios are switched to the standby radio if there is a failure in the
active radio.
The standby radio is monitored to ensure its correct operation
should a switch-over be required. See ‘Monitored Alarms’ on page
409 for the list of monitored alarms.
Serial Data Driven Switching The SR+ radio is part of an Aprisa SR+ Data Driven Protected
Station.
Provides radio and RS-232 serial port user interface protection for
Aprisa SR+ radios.
Primary Address
This parameter shows the IP address of the primary radio (usually the left side radio A).
Secondary Address
This parameter shows the IP address of the secondary radio (usually the right side radio B).
Radio
Transmit frequency, transmit power and channel size would normally be defined by a local regulatory body
and licensed to a particular user. Refer to your site license details when setting these fields.
Option Function
Single Antenna Select Single Antenna Single Port for a single antenna protected
Single Port station using one or two frequency half duplex transmission. The
antenna is connected to the ANT port.
Single Antenna Dual Select Single Antenna Dual Port for a single antenna protected
Port (duplexer) station using:
(1) One or two frequency in half duplex transmission with an
external duplexer (for filtering) connected to the ANT/TX and RX
antenna ports and single antenna connected to the duplexer.
(2) Two frequency in full duplex transmission with an external
duplexer (for full duplex operation) connected to the ANT/TX and
RX antenna ports and single antenna connected to the duplexer.
(3) Single frequency in half duplex transmission with external dual
antennas, connected to the ANT/TX and RX antenna ports.
(4) Two frequency in half or full duplex transmission with external
dual antennas, connected to the ANT/TX and RX antenna ports.
Dual Antenna Single Select Dual Antenna Single Port for a dual antenna protected
Port station using one or two frequency half duplex transmission. The
antenna is connected to the A and B TX/ANT ports.
Dual Antenna Dual Select Dual Antenna Dual Port for a dual antenna protected station
Port (duplexer) using:
(1) One or two frequency in half duplex transmission with two
external duplexer (for filtering) connected to the A and B ANT/TX
and RX antenna ports and single antenna connected to the
duplexer.
(2) Two frequency in full duplex transmission with an external
duplexer (for full duplex operation) connected to the A and B
ANT/TX and RX antenna ports and single antenna connected to the
duplexer.
(3) Single frequency in half duplex transmission with an external
dual antennas, connected to the A and B ANT/TX and RX antenna
ports.
(4) Two frequency in half or full duplex transmission with external
dual antennas, connected to the A and B ANT/TX and RX antenna
ports.
Ethernet
Protected Station: Ethernet > Summary
This page displays the current settings for the Protected Station Ethernet port parameters.
IP
Protected Station: IP > IP Summary
This page displays the current settings for the Protected Station Networking IP settings.
See ‘IP > IP Summary > Bridge / Gateway Router Modes’ on page 178 for configuration options.
NETWORKING IP SETTINGS
Changes in these parameters are automatically changed in the partner radio.
Primary IP Address
Set the static IP Address of the primary radio assigned by your site network administrator using the standard
format xxx.xxx.xxx.xxx. The default IP address is in the range 169.254.50.10.
Secondary IP Address
Set the static IP Address of the secondary radio assigned by your site network administrator using the
standard format xxx.xxx.xxx.xxx. The default IP address is in the range 169.254.50.10.
Note: The radio IP address should be used for SNMP management as using the PVIP for SNMP management
will result in undefined behaviour if a switch-over occurs during an SNMP transaction. Thus, using PVIP for
SNMP network management is not recommended.
After a switch-over, new active radio owns the PVIP and will send out a gratuitous ARP to clear the MAC
learning tables of upstream switches/routers.
Set the static IP Address of the PVIP using the standard format xxx.xxx.xxx.xxx. The default IP address is
0.0.0.0.
Subnet Mask
Set the Subnet Mask of the radio using the standard format xxx.xxx.xxx.xxx. The default subnet mask is
255.255.0.0.
Gateway
Set the Gateway address of the radio, if required, using the standard format xxx.xxx.xxx. The default
Gateway is 0.0.0.0.
Note 1: If the base station RF interface IP address is a network IP address, and if the remote radio is also
using a network IP address within the same subnet or different subnet, then the base radio will assign an
automatic RF interface IP address from its own subnet.
When the base radio has a host specific RF interface IP address, then all the remotes must have a host
specific RF interface IP address from the same subnet.
Note 2: If the user sets the RF interface IP address to a network IP address for Auto IP assignment, then the
radio will ignore the Radio Interface Subnet Mask setting and use a /23 network subnet ignoring the last two
octets.
Note 3: When a remote radio is configured for Router Mode and the base radio is changed from Bridge Mode
to Router Mode and the RF interface IP address is set to AUTO IP configuration (at least the last octet of the
RF interface IP address is zero), it is mandatory to configure the network topology by using the
‘Decommission Node’ and ‘Discover Nodes’ (see ‘Maintenance > Advanced’ on page 276).
Security
Protected Station: Security > Setup
This page displays the current settings for the Security parameters.
Option Function
USB Storage Disconnected A USB flash drive is not plugged into the radio host port.
USB Storage Connected A USB flash drive is plugged into the radio host port.
Controls
These buttons are grayed out if a USB flash drive is not plugged into the radio host port.
The ‘Load Primary From USB’ button loads the Key Encryption Key settings from the primary radio USB flash
drive into the primary radio.
The ‘Copy To Primary USB’ button copies the Key Encryption Key settings from the primary radio to the
primary radio USB flash drive.
The ‘Load Secondary From USB’ button loads the Key Encryption Key settings from the secondary radio USB
flash drive into the secondary radio.
The ‘Copy To Secondary USB’ button copies the Key Encryption Key settings from the secondary radio to the
secondary radio USB flash drive.
In a protected station, the ‘Accounts’ tab will indicate any differences between the user account
configuration of the primary radio and the secondary radio.
• If the user account is only configured for one of the radios, the user name will appear in red text,
the password field of that account will be displayed blank.
• If the user account is configured on both radios, but the privilege settings are different, then the
privilege configuration dropdown list will be surrounded by two red borders.
• If the user account is configured on both radios, but the current status of user account is different,
then the status field will be displayed in red text.
When there are empty password fields on the page, the user will be required to enter a new password for
each of the empty fields before saving the user configuration. Validation on this is performed and a pop up
will be displayed if a password has not been entered.
Maintenance
Protected Station: Maintenance > General
This page provides the management and control of the Protected Station Maintenance General settings.
DEFAULTS
The Maintenance Defaults page is only available for the local terminal.
Lock Active To
This parameter sets the Protection Switch Software Manual Lock. The Software Manual Lock only operates
if the Hardware Manual Lock is deactivated (set to the Auto position).
Option Function
Automatic The protection is automatic and switching will be governed by
normal switching and blocking criteria.
Primary The primary radio will become active i.e. traffic will be switched
to the primary radio.
Secondary The secondary radio will become active i.e. traffic will be switched
to the secondary radio.
Duration (s)
This parameter defines the period required for manually locking to the primary or secondary radios. When
this period elapses, the Lock To becomes automatic.
Option Function
Automatic The protection is automatic and switching will be governed by
normal switching and blocking criteria.
Software Manual Lock The Software Manual Lock has control of the protection switch.
Hardware Manual Lock The Hardware Manual Lock has control of the protection switch.
Active Unit
This parameter shows the radio which is currently active (Primary or Secondary).
Switch Count
This parameter shows the number of protection switch-overs since the last radio reboot (volatile).
COPY CONFIGURATION
When common parameters are changed in one radio, they are automatically changed in the partner radio
but if one radio has been replaced in the protected station, common parameters will need to be updated in
the new radio.
Note: This function does not copy user IDs, passwords, encryption keys or licenses. These must be entered
manually.
Copy Status
This parameter displays the status of the Copy Configuration.
Option Function
Available The Copy Configuration feature can be used (but not necessarily
required).
Processing The Copy Configuration feature is running and the % completed.
Option Function
Automatic The protection is automatic and switching will be governed by
normal switching and blocking criteria.
Software Manual Lock The Software Manual Lock has control of the protection switch.
Hardware Manual Lock The Hardware Manual Lock has control of the protection switch.
Active Unit
This parameter shows the radio which is currently active (Primary or Secondary).
Switch Count
This parameter shows the number of protection switch-overs since the last radio reboot (volatile).
NETWORK
See ‘Maintenance > Advanced’ on page 276 for parameter details.
Discover Nodes
This parameter when activated triggers the base station to poll the network with Node Missed Poll Count
and Node Registration Retry values.
This command only needs to be carried out on the Protected Station Active radio This will update the
network table which is shared by the Standby radio.
Decommission Node(s)
This parameter when activated resets the network registrations to remove the entire network from service.
This command only needs to be carried out on the Protected Station Active radio This will update the
network table which is shared by the Standby radio.
Events
The Events menu contains the setup and management of the alarms, alarm events and traps.
2. Informational Events
Informational Events are generated to provide information on key activities that are occurring on the radio.
These events do not indicate an alarm on the radio and are used to provide information only.
See ‘Alarm Types and Sources’ on page 454 for a complete list of events.
Software
The Software menu contains the setup and management of the system software including network software
distribution and activation on a protected station.
Method
This parameter sets the method of file transfer.
Option Function
Primary USB Transfer Transfers the software from the USB flash drive to the primary
radio.
FTP Transfers the software from an FTP server to the primary radio.
HTTP Transfers the software from a PC to the primary radio.
Transfer from Secondary Transfers the software from the secondary radio to the primary
Unit radio. This function is only available when the Protected Station is
not a Base Station.
4. When the transfer is completed, remove the USB flash drive from the primary radio host port. If the
SuperVisor ‘USB Boot Upgrade’ setting is set to ‘Disabled’ (see ‘USB Boot Upgrade’ on page 292), the
USB flash drive doesn’t need to be removed as the radio won’t try to load from it.
5. Go to ‘Protected Station: Software > Manager’ on page 381 to activate the Software Pack. The radio
will reboot automatically.
FTP Method
1. Unzip the software release files in to a temporary directory.
2. Open the FTP server and point it to the temporary directory.
3. Enter the FTP server IP address, Username and password into SuperVisor.
4. Click on ‘Start Transfer’.
5. Go to ‘Protected Station: Software > Manager’ on page 381 to activate the Software Pack. The radio
will reboot automatically.
3. Go to ‘Protected Station: Software > Manager’ on page 381 to activate the Software Pack. The radio
will reboot automatically.
If the file transfer fails, check the Event History page (see ‘Protected Station: Events > Secondary History’
on page 371) for more details of the transfer.
Method
This parameter sets the method of file transfer.
Option Function
Secondary USB Transfer Transfers the software from the USB flash drive to the secondary
radio.
FTP Transfers the software from an FTP server to the secondary radio.
HTTP Transfers the software from a PC to the secondary radio.
Transfer from Primary Transfers the software from the primary radio to the secondary
Unit radio. This function is only available when the Protected Station is
not a Base Station.
4. When the transfer is completed, remove the USB flash drive from the secondary radio host port. If the
SuperVisor ‘USB Boot Upgrade’ setting is set to ‘Disabled’ (see ‘USB Boot Upgrade’ on page 292), the
USB flash drive doesn’t need to be removed as the radio won’t try to load from it.
5. Go to ‘Protected Station: Software > Manager’ on page 381 to activate the Software Pack. The radio
will reboot automatically.
FTP Method
1. Unzip the software release files in to a temporary directory.
2. Open the FTP server and point it to the temporary directory.
3. Enter the FTP server IP address, Username and password into SuperVisor.
3. Click on ‘Start Transfer’.
4. Go to ‘Protected Station: Software > Manager’ on page 381 to activate the Software Pack. The radio
will reboot automatically.
3. Go to ‘Protected Station: Software > Manager’ on page 381 to activate the Software Pack. The radio
will reboot automatically.
If the file transfer fails, check the Event History page (see ‘Protected Station: Events > Primary History’ on
page 370) for more details of the transfer.
Status
This parameter displays the status of the software version running on the radio.
Option Function
Active The software is operating the radio.
Inactive The software is not operating the radio but could be re-activated if
required.
Status
This parameter displays the status of the software pack version.
Option Function
Available On the base station, the software pack is available for distribution.
On all stations, the software pack is available for activation.
Activating The software pack is activating in the radio.
Unavailable There is no software pack loaded into the radio.
Activate
See ‘Software > Manager’ on page 297 for the activation options.
Status
This parameter displays the status of the software pack version.
If a Software Pack is not available, the status will display ‘Unavailable’ and the software distribution
mechanism will not work.
Start Transfer
This parameter when activated distributes (broadcasts) the new Software Pack to all remote radios in the
network.
Note: The distribution of software to remote radios does not stop customer traffic from being transferred.
However, due to the volume of traffic, the software distribution process may affect customer traffic.
Software distribution traffic is classified as ‘management traffic’ but does not use the Ethernet management
priority setting. Software distribution traffic priority has a fixed priority setting of ‘very low’.
1. To ensure that the Network Table is up to date, it is recommended running the node discover function
(see ‘Discover Nodes’ on page 276).
2. Click on ‘Start Transfer’.
Note: This process could take anywhere between 40 minutes and several hours depending on channel size,
Ethernet Management Priority setting and the amount of customer traffic on the network.
Result Function
Over the Air Transfer The percentage of the software pack that has been broadcast to
Progress the remote radios.
Poll Remote Locations X is the number of radios polled to determine the number of
standby radios.
Y is the number of remote radios registered with the base station.
Transfer software to X is the number of standby radios with the new software version.
remote standby radios Y is the number of standby radios requiring the new software
version.
3. When the distribution is completed, activate the software with the Remote Software Activation.
Pause Transfer
This parameter when activated, pauses the Over the Air Transfer Process and shows the distribution status.
The distribution process will continue from where it was paused with Resume Transfer.
Cancel Transfer
This parameter when activated, cancels the Over the Air Transfer Process immediately.
During the distribution process, it is possible to navigate away from this page and come back to it to check
progress. The SuperVisor session will not timeout.
Version
This parameter displays the software version for activation. The default version is the software pack version
but any valid software version can be entered in the format ‘n.n.n’.
Activation Type
This parameter sets when the software pack activation will occur.
Option Function
Now Activates the software pack now.
Date & Time Activates the software pack at the Date & Time set in the following
parameter.
Note: Do not navigate SuperVisor away from this page during the activation process (SuperVisor can lose PC
focus).
1. Enter the Software Pack version (if different from displayed version).
2. See ‘Software > Manager’ on page 297 for the activation options.
The remote radios will be polled to determine which radios require activation:
Result Function (X of Y)
Remote Radios Polled for X is the number of radios polled to determine the number of
Partners protected stations in the network.
Y is the number of remote radios registered with the base station.
Remote Radios Polled for X is the number of radios polled to determine the number of radios
New Version that contain the new software version.
Y is the number of remote radios registered with the base station.
Remote Radios Activated X is the number of radios that contain the new software version
and have been activated.
Y is the number of radios that contain the new software version
and can be activated.
Remote Radios On New X is the number of radios that has been successfully activated and
Version now running the new version of software.
Y is the number of radios that the activation command was
executed on.
The example shows that during the activation process there were exceptions that may need to be
investigated.
When all the remote radios have been activated, the base station radio must now be activated with (see
‘Software > Manager’ on page 297).
1. Connect the radio management port (MGMT) to your PC with a USB A to USB micro B cable.
2. USB to UART Bridge VCP Drivers are required to connect the radio USB port to your PC. You can download
and install the relevant driver from;
https://www.silabs.com/products/development-tools/software/usb-to-uart-bridge-vcp-drivers
Unzip the USB serial driver to a temporary location and install the appropriate driver on your computer.
3. Go to your computer device manager (Win 7: Control Panel > Administrative Tools > Computer
Management > Device Manager)
4. Click on ‘Ports (COM & LPT)’
5. Make a note of the COM port which has been allocated to the ‘Silicon Labs CP210x USB to UART Bridge’
(COM3 in the example below)
6. Open HyperTerminal or an alternative type of terminal Emulator program e.g. TeraTerm or Putty.
HyperTerminal Example
7. Enter a name for the connection (Aprisa SR+ CLI for example) and click OK.
8. Select the COM port from the Connect Using drop-down box that was allocated to the UART USB.
1. Connect the PC Ethernet to the radio Ethernet port (assuming a compatible IP address range).
2. Open the PC Command Prompt.
3. Type Telnet and the IP address of the radio ‘Telnet xx.xx.xx.xx’.
4. Login to the CLI with a default username ‘admin’ and password ‘admin’.
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an
unsecured network. It is used in the Aprisa SR+ to provide a secure CLI remote access connection to the
radio. SSH is operated in server client mode, where the radio is acting as the SSH server. The communication
between the client and radio (server) is encrypted in SSHv2 (where SSHv2 vs SSHv1 uses a more enhanced
security encryption algorithm).
The Aprisa radio SSH server uses the following algorithms to secure the connection:
• Key exchange: diffie-hellman-group14-sha1, diffie-hellman-group1-sha1
• Data Integrity: hmac-sha2-256, hmac-sha1-96, hmac-sha1
• Encryption: aes128-cbc
• Host key: RSA
1. Connect the PC Ethernet to the radio Ethernet port (assuming a compatible IP address range).
2. Install one of the following tested SSH clients on your PC.
• PuTTY - Windows / Ubuntu
• TeraTerm
• Secure CRT
• MobaXterm
• OpenSSH
• Linux Terminal (Ubuntu)
• Kitty portal
• DameWare
• smartTTY
• Terminals (https://terminals.codeplex.com/)
• mRemoteng - Multi-Remote Next Generation
CLI Commands
The cd and ls commands can be used to navigate the MIBs in the CLI however, 4RF recommends the use of
the get and set commands in conjunction with the distributed MIB files.
The MIB files are provided as part of the software pack available on the 4RF website
https://www.4rf.com/secure.
Contact [email protected] if you are not familiar with the use of MIB files.
The top level CLI command list is displayed by typing a ? at the command prompt.
The following is a list of the top level CLI commands and their usage:
8. In-Service Commissioning
Before You Start
When you have finished installing the hardware, RF and the traffic interface cabling, the system is ready to
be commissioned. Commissioning the radio is a simple process and consists of:
1. Powering up the radios.
2. Configuring all radios in the network using SuperVisor.
3. Aligning the antennas.
4. Testing that the links are operating correctly.
5. Connecting up the client or user interfaces.
Antenna Alignment
A base station omni-directional collinear antenna has a vertical polarization. The remote radio yagi antennas
must also have vertical polarization.
Note: Low gain antennas need less adjustment in elevation as they are simply aimed at the horizon. They
should always be panned horizontally to find the peak signal.
1. Press and hold the TEST button on the radio LED panel until all the LEDs flash green (about 3 - 5 seconds).
Note: The time for the LEDs to display the RSSI result is variable, depending on the network traffic, and
can be up to 5 seconds. Small antenna adjustments should be made and then wait for the display to
refresh.
The RSSI poll refresh rate can be set with the SuperVisor command ‘Transmit Period’ (see ‘Maintenance
> Test Mode’ on page 263).
2. Move the antenna through a complete sweep horizontally (pan). Note down the RSSI reading for all the
peaks in RSSI that you discover in the pan.
3. Move the antenna to the position corresponding to the maximum RSSI value obtained during the pan.
Move the antenna horizontally slightly to each side of this maximum to find the two points where the
RSSI drops slightly.
4. Move the antenna halfway between these two points and tighten the clamp.
5. If the antenna has an elevation adjustment, move the antenna through a complete sweep (tilt)
vertically. Note down the RSSI reading for all the peaks in RSSI that you discover in the tilt.
6. Move the antenna to the position corresponding to the maximum RSSI value obtained during the tilt.
Move the antenna slightly up and then down from the maximum to find the two points where the RSSI
drops slightly.
7. Move the antenna halfway between these two points and tighten the clamp.
8. Recheck the pan (steps 2-4) and tighten all the clamps firmly.
9. To exit Test Mode, press and hold the TEST button until all the LEDs flash red (about 3 – 5 seconds).
9. Product Options
Option Function
HW Type A Standard Aprisa SR+ radio.
HW Type B Power optimized radio including Sleep Modes.
HW Type C 100 kHz channel size.
The Aprisa SR+ hardware type can be identified from SuperVisor (see ‘HW Type’ on page 110) or from the
Compliance label on the radio bottom.
The product shown below is the two Ethernet ports plus two RS-232 serial ports.
Note: The optional serial interface is always available via the USB to serial converter.
Point-To-Point Link
The Aprisa SR+ can be configured for Point-To-Point (PTP) operation transporting a combination of serial
data and Ethernet data between the local and remote radio (see ‘Terminal Operating Mode’ on page 119).
SuperVisor Point-To-Point
The following shows the components of the SuperVisor page layout for a standard Point-To-Point radio:
The branding bar at the top of the SuperVisor frame shows the branding of SuperVisor on the left and the
product branding on the right.
Position Function
Left Local
Provides full configuration and supervision of the local radio
Remote
Provides full configuration and supervision of the remote radio
Link
Provides configuration and supervision of the common local and
remote radio parameters
Right The access level logged into SuperVisor. This label also doubles as
the SuperVisor logout button.
The alarm bar displays the radio name and alarms of the local radio i.e. the radio that SuperVisor is logged
into on the left and the remote radio name and alarms on the right.
The LED alarm indicators reflect the status of the front panel LEDs on the radios.
The following is the SuperVisor Terminal Summary opening screen for a standard Point-To-Point radio:
The following is the SuperVisor Link Details screen for a standard Point-To-Point radio:
Protected Station
The Aprisa SR+ Protected Station is fully monitored hot-standby and fully hot-swappable product providing
radio and user interface protection for Aprisa SR+ radios. The RF ports and interface ports from the active
radio are switched to the standby radio if there is a failure in the active radio.
Option Example
The Aprisa SR+ Protected Station is comprised of an Aprisa SR+ Protection Switch and two standard Aprisa
SR+ radios mounted in a 2U rack mounting chassis.
All interfaces (RF, data, etc.) are continually monitored on both the active and standby radio to ensure
correct operation. The standby radio can be replaced without impacting traffic flow on the active radio.
The Aprisa SR+ radios can be any of the currently available Aprisa SR+ radio frequency bands, channel sizes
or interface port options.
The Aprisa SR+ Protected Station can operate as a base station, repeater station or remote radio. The
protection behaviour and switching criteria between the active and standby radios is identical for the three
configurations.
By default, the Aprisa SR+ Protected Station is configured with the left hand radio (A) designated as the
primary radio and the right hand radio (B) designated as the secondary radio.
Each radio is configured with its own unique IP and MAC address and the address of the partner radio.
On power-up, the primary radio will assume the active role and the secondary radio will assume the standby
role. If, for some reason, only one radio is powered on it will automatically assume the active role.
Both the Aprisa SR+ Protected Station primary radio and secondary radio must be operating on the same
software version.
Protected Ports
The protected ports are located on the protected station front panel. Switching occurs between the active
radio ports and the standby radio ports based on the switching criteria described below.
The protected ports include:
• Antenna ports ANT/TX and RX (if dual antenna ports used)
• Ethernet ports (depending on interface port option purchased)
• Serial ports (depending on interface port option purchased)
Operation
In hot-standby normal operation, the active radio carries all RS-232 serial and Ethernet traffic over the radio
link and the standby radio transmit is on with its transmitter connected to an internal load. Both radios are
continually monitored for correct operation including the transmitter and receiver and alarms are raised if
an event occurs.
The active radio sends regular ‘keep alive’ messages to the standby radio to indicate it is operating
correctly. In the event of a failure on the active radio, the RF link and user interface traffic is automatically
switched to the standby radio.
The failed radio can then be replaced in the field without interrupting user traffic.
Switch Over
The switch-over to the standby radio can be initiated automatically, on fault detection, or manually via the
Hardware Manual Lock switch on the Protection Switch or the Software Manual Lock from SuperVisor.
Additionally, it is possible to switch-over the radios remotely without visiting the station site, via the remote
control connector on the front of the Protection Switch.
On detection of an alarm fault the switch-over time is less than 0.5 seconds. Some alarms may take up to
30 seconds to be detected depending on the configuration options selected.
The Protection Switch has a switch guard mechanism to prevent protection switch oscillation. If a switch-
over has occurred, subsequent switch-over triggers will be blocked if the guard time has not elapsed.
The guard time starts at 20 seconds and doubles each switch-over to a maximum of 320 seconds and halves
after a period of two times the last guard time with no protection switch-overs.
Switching Criteria
The Protected Station will switch-over operation from the active to the standby radio if any of the
configurable alarm events occur, or if there is a loss of the ‘keep alive’ signal from the active radio.
It is possible to configure the alarm events which will trigger the switch-over. It is also possible to prevent
an alarm event triggering a switch-over through the configuration of blocking criteria.
Any of the following alarm events can be set to trigger or prevent switching from the active radio to the
standby radio (see ‘Events > Events Setup’ on page 280).
PA current
Tx reverse power Tx AGC
Temperature threshold Thermal shutdown
RSSI Threshold RX Synthesizer Not Locked
Rx CRC errors RF no receive data
Port 1 Eth no receive data Port 2 Eth no receive data
Port 1 Eth data receive errors Port 2 Eth data receive errors
Port 1 Eth data transmit errors Port 2 Eth data transmit errors
Port 3 Eth no receive data Port 4 Eth no receive data
Port 3 Eth data receive errors Port 4 Eth data receive errors
Port 3 Eth data transmit errors Port 4 Eth data transmit errors
Port 1 Serial Data No RX Data Port 2 Serial Data RX Data
Port 1 Serial Data RX Errors Port 2 Serial Data RX Errors
USB Port Serial Data No RX Data USB Port Serial Data RX Errors
Component failure Calibration failure
Configuration not supported Protection Hardware Failure
Alarm Input 1 Alarm Input 2
It will not attempt to switch-over to a standby radio which has power failure.
It will also not switch over to a standby radio with an active alarm event which has been configured as a
‘blocking criteria’.
Switch-over will be initiated once either of these conditions is rectified, i.e. power is restored, or the alarm
is cleared.
Monitored Alarms
The following alarms are monitored by default on the active / standby radio. The monitored alarms are
dependent on the Protection Type selected.
All Protection
Protection Type Redundant Monitored Hot Standby
Types
Temperature Threshold
TX Synthesizer Not Locked
Thermal Shutdown
RSSI Threshold
RX Synthesizer Not Locked
RX CRC Errors
RF No Receive Data
Port1 ETH No Receive Data
Port1 ETH Data Receive Errors
Port1 ETH Data Transmit Errors
Port2 ETH No Receive Data
Port2 ETH Data Receive Errors
Port2 ETH Data Transmit Errors
Port3 ETH No Receive Data
Port3 ETH Data Receive Errors
Port3 ETH Data Transmit Errors
Port4 ETH No Receive Data
Port4 ETH Data Receive Errors
Port4 ETH Data Transmit Errors
Port1 Serial Data No RX Data
Port1 Serial Data RX Errors
Port2 Serial Data No RX Data
Port2 Serial Data RX Errors
USB Port Serial Data No RX Data
USB Port Serial Data No RX Errors
Component Failure
Protection SW Manual Lock
Protection HW Manual Lock
Modem FEC Disable
All Protection
Protection Type Redundant Monitored Hot Standby
Types
Alarm Input 1
Alarm Input 2
Protection Peer Comms Lost
Protection Hardware Failure
Configuration Management
The Primary and Secondary radios are managed with the embedded web-based management tool,
SuperVisor, by using either the Primary or Secondary IP address. Configuration changes in one of the radios
will automatically be reflected in the partner radio.
To ensure all remote radios are registered to the correct (active) base station, changes to the Network Table
are automatically synchronized from the active radio to the standby radio. The Network Table is only visible
on the active radio. This synchronization does not occur if the Hardware Manual Lock is active.
The state of the switch is indicated by the three LEDs on the Protection Switch:
The Protection Switch also has a Software Manual Lock. The Hardware Manual Lock takes precedence over
Software Manual Lock if both diagnostic functions are activated i.e. if the Software Manual Lock is set to
‘Primary’ and the Hardware Manual Lock set to ‘Secondary’, the system will set the Secondary radio to
Active.
When a Hardware Manual Lock is deactivated (set to the Auto position), the Software Manual Lock is re-
evaluated, and locks set appropriately.
Remote Control
The switch-over to the standby radio can be initiated via the Remote Control connector on the front of the
Protection Switch. This control will only operate if the Hardware Manual Lock switch is set to the Auto
position.
The inputs are logic inputs with 4700 Ω pullup to +3.3 VDC. They require a pull down to ground to activate
the control. The ground potential is available on the connector (see ‘Protection Switch Remote Control
Connections’ on page 453).
L2 / L3 Protection Operation
The Aprisa SR+ Protected Station has selectable L2 Bridge or L3 Router modes, with VLAN, QoS and L2/3/4
address filtering attributes. Each Radio is configured with its own unique IP and MAC address and partner
radio address. On switch-over failure, the new active radio sends out a gratuitous ARP to update the MAC
learning tables / ARP tables of the upstream bridge / router for the appropriate traffic flow.
Hot-Swappable
The two Aprisa SR+ radios are mounted on a pull-out tray to making it possible to replace a failed radio
without interrupting user traffic.
Installation
Mounting
The Aprisa SR+ Protected Station is designed to mount in a standard 19 inch rack.
Cabling
The Aprisa SR+ Protected Station is delivered pre-cabled with power, interface, management and RF cables.
There are two options for the pre-cabled Protected Station (see ‘Antenna and Duplexer Options’):
1. Standard Protected Station- suitable for options #1 and #2 (single antenna operation)
2. Dual Antenna Protected Station- suitable for options #3 and #4 (dual antenna operation)
Each option (per ordered part number) is pre-cable configured as the following:
Users can change an existing Protected Station from one option to the other option by following the
procedure:
To change a pre-cabled Protected Station from one option to the other option:
1. Disconnect the power supply, antenna/s, interface cables and any other connections
2. Remove the Protected Station shelf from the rack
3. Turn the Protected Station shelf upside down
4. Remove the securing screws and remove the bottom panel
5. Unscrew the four coaxial cable clamp screws
6. Swap the two cables and position them in the appropriate connector ports
7. Refit the coaxial cable clamp and tighten the four clamp screws
8. Refit the bottom panel and tighten the two screws
9. Replace the shelf in the rack
Power
The external power source must be connected to both the A and B Molex 2 pin male power connectors
located on the protected station front panel. The A power input powers the A radio and the B power input
powers the B radio.
The protection switch is powered from the A power input or the B power input (whichever is available).
The maximum combined power consumption is 42 Watts for 10 W transmit peak power.
The Aprisa SR+ Protected station has two DC power options, 13.8 VDC and 48 VDC.
13.8 VDC
The 13.8 VDC nominal external power source can operate over the voltage range of +10.5 to +30 V DC
(negative earth).
48 VDC
The 48 VDC nominal external power source can operate over the voltage range of 18 to 60 V DC (floating).
Alarms
The protection switch provides access to both the A radio and B radio Alarm Interfaces (see ‘Alarm Interface
Connections’ on page 451 for the connector pinout).
Maintenance
1. Ensure the replacement radio has the same version of software installed as the primary radio. If
necessary, upgrade the software in the replacement radio.
2. Set the Protection Switch MAC address (see ‘Protected Station: Maintenance > Advanced’ on page 367).
This MAC address is present on chassis label.
3. Using SuperVisor > Maintenance > Advanced ‘Save Configuration to USB’ and ‘Restore Configuration from
USB’ operation, clone the primary radio’s configuration to the replacement radio.
4. Configure the replacement radio as the secondary radio and setup the IP address and other protection
parameters (see ‘Terminal > Operating Mode’ on page 119).
5. Set the Hardware Manual Lock switch to make the primary radio active.
6. Unplug the interface port cables, the Alarm and Protect port cables and the power connector from the
faulty radio being replaced. The two screws securing the power connector will need to be undone.
7. Carefully remove the faulty radio from the protection switch.
8. Install the replacement radio into the protection switch.
9. Ensuring that the cables are not crossed over, plug in the interface port cables, the Alarm and Protect
port cables and the power connector to the replacement radio. Secure the power connector with the
two screws.
10. Power on the replacement radio and wait for it to become standby.
11. Set the Hardware Manual Lock switch to the Auto position.
1. If the A power supply is faulty, ensure that the B radio is active (whether it be the primary or secondary
radio).
If the B power supply is faulty, ensure that the A radio is active (whether it be the primary or secondary
radio).
2. Replace the faulty power supply.
Move the radios, the interface cables and the power cables to the replacement Protection Switch.
Decommission Node’ on page 277) and then Discover the Nodes (see ‘Discover Nodes’ on page 276).
Ensure that the Hardware Manual Lock switch is set to the Auto position.
The Aprisa SR+ Protected Station is now ready to operate.
Spares
The Aprisa SR+ Protection Switch is available as spare parts for the three radio interface port options:
Example Part:
Part Number Part Description
APSQ-D400-SSC-HD-22-ENAA 4RF SR+, PD, 400-470 MHz, SSC, Half Dup, 2E2S, EN, STD
The Aprisa SR+ Data Driven Protected Station shown is comprised of two standard Aprisa SR+ setup as ‘dual
antenna port’, ‘half duplex’ radios and two external duplexers mounted on 19" rack mounting shelves.
The Aprisa SR+ radios can be any of the currently available Aprisa SR+ radio frequency band options.
By default, the Aprisa SR+ Data Driven Protected Station is configured with the left hand radio (A) designated
as the primary radio and the right hand radio (B) designated as the secondary radio.
Each radio is configured with its own unique IP and MAC address and the address of the partner radio.
On power-up, the primary radio will assume the active role and the secondary radio will assume the standby
role. If, for some reason, only one radio is powered on it will automatically assume the active role.
Operation
The active radio is determined explicitly by which radio receives data on its RS-232 serial port input from
the interface.
The active radio carries all RS-232 serial traffic over its radio link and the standby radio is unused with its
transmitter turned off.
If data is received on the RS-232 serial port interface input of the standby radio, it will immediately become
the active radio and the radio which was active will become the standby radio.
Switch Over
The active radio is determined explicitly by which radio receives data on its RS-232 serial port.
The switching and blocking criteria used for the standard Protected Station do not apply. This means that
events and alarms on the unit are not used as switching criteria.
Configuration Management
The Primary and Secondary radios are managed with the embedded web-based management tool, SuperVisor
(see ‘Managing the Radio’ on page 87) by using either the Primary or Secondary IP address. Configuration
changes in one of the radios will automatically be reflected in the partner radio.
Changes to the Network Table are automatically synchronized from the active radio to the standby radio
but the Network Table is only visible on the active radio.
Power
A +10.5 to +30 V DC external power source must be connected to both the A and B Molex 2 pin male power
connectors. The maximum combined power consumption is 42 Watts for 10 W transmit peak power.
Installation
Mounting
The Aprisa SR+ Data Driven Protected Station is designed to mount in a standard 19” rack on two 1U rack
mounting shelves (total of 3RU).
Cabling
The Aprisa SR+ Data Driven Protected Station is delivered with the radios, duplexers, rack mounting shelves
and interconnect cables. The set of interconnect cables is available as a spare part.
Duplexer Kits
The Aprisa SR+ product range contains Duplexer Kit accessories for use with Aprisa SR+ radios configured for
Single Antenna Dual Port operation.
Aprisa SR+ Duplexer Kit for a Aprisa SR+ Protected Station containing:
1x N0 Duplexer 135 MHz, s4.6 MHz, p0.5 MHz, N type female antenna
APSB-KDUP-135-N0-PS connector
2x right angle TNC to SMA right angle 640mm cables
Rack front mounted
Aprisa SR+ Duplexer Kit for a dual antenna Aprisa SR+ Protected Station
containing:
2x N0 Duplexer 135 MHz, s4.6 MHz, p0.5 MHz, N type female antenna
APSB-KDUP-135-N0-PS-DA
connector
4x right angle TNC to SMA right angle 640mm cables
Rack front mounted
Aprisa SR+ Duplexer Kit for a Aprisa SR+ Protected Station containing:
1x 1U 19" rack front mount shelf with duplexer mounting brackets and
screws
APSB-KDUP-320-A1-PS
1x A1 Duplexer 300 MHz, s 5 MHz, p 0.5 MHz, N type female antenna
connector
2x right angle TNC to SMA right angle 640mm cables
Aprisa SR+ Duplexer Kit for a dual antenna Aprisa SR+ Protected Station
containing:
1x 1U 19" rack front mount shelf with duplexer mounting brackets and
APSB-KDUP-320-A1-PS-DA screws
2x A1 Duplexer 300 MHz, s 5 MHz, p 0.5 MHz, N type female antenna
connector
4x right angle TNC to SMA right angle 640mm cables
Aprisa SR+ Duplexer Kit for a dual antenna Aprisa SR+ Protected Station
containing:
1x 1U 19" rack front mount shelf with duplexer mounting brackets and
APSB-KDUP-400-B1-PS-DA screws
2x B1 Duplexers 400 MHz, s 5 MHz, p 0.5 MHz, N type female antenna
connector
4x right angle TNC to SMA right angle 640mm cables
Aprisa SR+ Duplexer Kit for a Aprisa SR+ Protected Station containing:
1x 1U 19" rack front mount shelf with duplexer mounting brackets and
screws
APSB-KDUP-400-B1-PS
1x B1 Duplexer 400 MHz, s 5 MHz, p 0.5 MHz, N type female antenna
connector
2x right angle TNC to SMA right angle 640mm cables
Aprisa SR+ Duplexer Kit for a Aprisa SR+ Protected Station containing:
1x 1U 19" rack front mount shelf with duplexer mounting brackets and
screws
APSB-KDUP-450-M0-PS
1x M0 Duplexer 450 MHz, s 5 MHz, p 0.5 MHz, N type female antenna
connector
2x right angle TNC to SMA right angle 640mm cables
Aprisa SR+ Duplexer Kit for a dual antenna Aprisa SR+ Protected Station
containing:
1x 1U 19" rack front mount shelf with duplexer mounting brackets and
APSB-KDUP-450-M0-PS-DA screws
2x M0 Duplexer 450 MHz, s 5 MHz, p 0.5 MHz, N type female antenna
connector
4x right angle TNC to SMA right angle 640mm cables
Aprisa SR+ Duplexer Kit for a Aprisa SR+ Protected Station containing:
1x 1U 19" rack front mount shelf with duplexer mounting brackets and
screws
APSB-KDUP-450-P0-PS
1x P0 Duplexer 450 MHz, s 3 MHz, p 0.5 MHz, N type female antenna
connector
2x right angle TNC to SMA right angle 640mm cables
Aprisa SR+ Duplexer Kit for a dual antenna Aprisa SR+ Protected Station
containing:
1x 1U 19" rack front mount shelf with duplexer mounting brackets and
APSB-KDUP-450-P0-PS-DA screws
2x P0 Duplexer 450 MHz, s 3 MHz, p 0.5 MHz, N type female antenna
connector
4x right angle TNC to SMA right angle 640mm cables
Aprisa SR+ Duplexer Kit for a Aprisa SR+ Protected Station containing:
1x 1U 19" rack front mount shelf with duplexer mounting brackets and
screws
APSB-KDUP-700-E0-PS
1x E0 Duplexer 700 MHz, min split 30 MHz, p 7.0 MHz, N type female
antenna connector
2x right angle TNC to SMA right angle 640mm cables
Aprisa SR+ Duplexer Kit for a single antenna SR+ Protected Station
containing:
1x 1U 19" rack front mount shelf with duplexer mounting brackets and
APSB-KDUP-700-E1-PS-SA screws to mount 1x E1 duplexer
1x E1 Duplexer 700 MHz, min split 30 MHz, p 1.0 MHz, N type female
antenna connector
2x TNC to SMA right angle 640mm cables
Aprisa SR+ Duplexer Kit for a dual antenna SR+ Protected Station
containing:
1x 1U 19" rack front mount shelf with duplexer mounting brackets and
APSB-KDUP-700-E1-PS-DA screws to mount 2x E1 duplexers
2x E1 Duplexers 700 MHz, min split 30 MHz, p 1.0 MHz, N type female
antenna connector
4x TNC to SMA right angle 640mm cables
Aprisa SR+ Duplexer Kit for a single antenna SR+ Protected Station
containing:
1x 1U 19" rack front mount shelf with duplexer mounting brackets and
APSB-KDUP-700-E1-PS-SATF screws to mount 1x E1 duplexer
1x E1 Duplexer 700 MHz, min split 30 MHz, p 1.0 MHz, TNC female
antenna connector
2x TNC to SMA right angle 640mm cables
Aprisa SR+ Duplexer Kit for a dual antenna SR+ Protected Station
containing:
1x 1U 19" rack front mount shelf with duplexer mounting brackets and
APSB-KDUP-700-E1-PS-DATF screws to mount 2x E1 duplexers
2x E1 Duplexers 700 MHz, min split 30 MHz, p 1.0 MHz, TNC female
antenna connector
4x TNC to SMA right angle 640mm cables
Aprisa SR+ Duplexer Kit for a Aprisa SR+ Protected Station containing:
1x 1U 19" rack front mount shelf with duplexer mounting brackets and
screws
APSB-KDUP-928-G0-PS
1x G0 Duplexer 900 MHz, s 40 MHz, p 7 MHz, N type female antenna
connector
2x TNC to SMA right angle 590mm cables
Aprisa SR+ Duplexer Kit for a SR+ Protected Station containing:
1x 1U 19" rack front mount shelf with duplexer mounting brackets and
screws
APSB-KDUP-928-G2-PS
1x G2 Duplexer 900 MHz, s 9 MHz, p 1 MHz, N type female antenna
connector
2x TNC to SMA right angle 590mm cables
Aprisa SR+ Duplexer Kit for a SR+ Protected Station containing:
1x 1U 19" rack mid mount shelf with duplexer mounting brackets and
screws
APSB-KDUP-928-G2-PS-MM
1x G2 Duplexer 900 MHz, s 9 MHz, p 1 MHz, N type female antenna
connector
2x TNC to SMA right angle 590mm cables
Aprisa SR+ Duplexer Kit for a SR+ Protected Station containing:
1x 2U 19" rack mid mount shelf with duplexer mounting brackets and
screws
APSB-KDUP-928-G3-PS-MM
1x G3 Duplexer 900 MHz, s5.5 MHz, p0.5 MHz, N type female antenna
connector
2x TNC to SMA right angle 640mm cables
On a USB RS-232 port, Modbus RTU can operate up to 9600 bit/s with all packet sizes and up to 115200 bit/s
if the packet size is less than 64 bytes. The standard RS-232 port is fully compatible with Modbus RTU at all
baud rates.
1. USB Converter to 1.8 metre multi-strand cable 6 wire for termination of customer connector
2. USB converter to RJ45 female kit for USB to RS-232 DCE conversion.
3. USB converter to DB9 female kit for USB to RS-232 DCE conversion.
1. USB Converter to 1.8 metre multi-strand cable 6 wire for termination of customer interface
10. Maintenance
Spare Fuses
CAUTION: Antistatic precautions must be taken as the internal components are static sensitive.
Note: Is it critical that the screws are re-tightened to 0.8 Nm. The regulatory compliance of the radio may
be affected if the screws are not tightened correctly.
The 12A fuses are the main power supply input The 7A fuses are the main power supply input
fuses fuses
No User-Serviceable Components
Apart from changing the fuses, there are no user-serviceable components within the radio.
All hardware maintenance must be completed by 4RF or an authorized service centre.
Do not attempt to carry out repairs to any boards or parts.
Do not remove the internal RF section shield as this could void the compliance and will void the product
warranty.
CAUTION: Electro Static Discharge (ESD) can damage or destroy the sensitive electrical components in the
radio.
Software Upgrade
A software upgrade can be performed on a single Aprisa SR+ radio or an entire Aprisa SR+ network.
Note: The distribution of software to remote radios does not stop customer traffic from being
transferred. However, due to the volume of traffic, the software distribution process may affect
customer traffic.
Software distribution traffic is classified as ‘management traffic’ but does not use the Ethernet
management priority setting. Software distribution traffic priority has a fixed priority setting of ‘very
low’.
3. Activate the software on the entire network of remote radios (see ‘Software > Remote Activation’ on
page 303).
Note: When the new software activates on the remote radios, all link communication from the base
station to the remote will be lost. The base station will attempt to re-establish connectivity to the
remote radios for the new version verification but this will fail. However, when the new software
activates on the remote radios, the remote radio will reboot automatically and link communication will
restore when the base station software is activated.
When the Remote Activation process gets to the ‘Remote Radios On New Version’ step, don’t wait for
this to complete but proceed to step 4.
4. Activate the software on the base station radio (see ‘Software > Manager’ on page 297).
5. When the new software has been activated, remote radios will re-register with the base station. The
remote radios software version can verified with ‘Network Status > Network Table’ on page 331.
6. When the base station restarts with the new software, rediscover the nodes (see ‘Discover Nodes’ on
page 276).
7. Check that all remote radios are now running on the new software (see ‘Network Status > Network
Table’ on page 331).
Note: The following steps will only be necessary if for some reason steps 1-7 did not operate correctly
or if software activation is attempted before the distribution process ends or the remote radio was off
during steps 1-7 and turns on later. Thus, the following steps will most likely not be required.
8. If step 7 shows that not all remote radios are running the latest software version, restore the base
station to the previous software version (see ‘Software > Manager’ on page 297).
9. Attempt to re-establish connectivity to the remote radios that have failed to upgrade by navigating to
and remotely managing the remote radios individually.
10. Navigate to the remote radio history log and review the logs to determine the reason for the failure to
activate the new software version.
11. Take appropriate actions to address the reported issue. If connectivity restores with the failed remotes,
repeat steps 2-7 if required.
Confirm that the new software version is now running on the radios
1. Re-login into the Protection Station and navigate to SuperVisor > Software>Summary.
2. Confirm that the Primary and Secondary radio current software version is now up to date
3. Confirm that the list of remote radios are now running the latest software version with ‘Network Status
> Network Table’ on page 331.
4. When the upgrade process is complete, if the Hardware Manual Lock switch has been used, set it to the
Auto position. The software manual lock will release automatically.
Note: If a radio has been configured for a Protection Type of ‘Redundant’, and that radio is no longer part
of a Protected Station, the Protection Type must be changed to ‘None’ before the radio software upgrade
can be achieved.
Login to the radio being upgraded and go to SuperVisor ‘Software > Manager’ on page 297.
The version of the uploaded software will be displayed in the Software Pack ‘Version’ field and the current
software version.
If the upgrade process did not start, the Aprisa SR+ could already be operating on the version of software
on the USB flash drive. This will be indicated by flashing OK LED and then the OK, MODE and AUX will light
steady green.
If the radio is not operating on the new software (after the power cycle), it could be caused by the SuperVisor
‘USB Boot Upgrade’ setting set to ‘Load Only’ (see ‘Software > Setup’ on page 292).
In this case, go to SuperVisor see ‘Software > Manager’ on page 297 and tick the Software Pack ‘Activate’
checkbox and click ‘Apply’.
If any Display Panel LED flashes red or is steady red during the upgrade process, it indicates that the upgrade
has failed. This could be caused by incorrect files on the USB flash drive or a radio hardware failure.
Software Downgrade
Radio software can also be downgraded if required. This may be required if a new radio is purchased for an
existing network which is operating on an earlier software release.
The downgrade process is the same as the upgrade process.
Assuming the Primary radio is active and the Secondary radio is standby
1. Using the Hardware Manual Lock switch, force the primary radio to active.
2. Insert the USB flash drive with the new software release into the secondary radio host port .
3. Power cycle the secondary radio. The radio will be upgraded with the new software.
4. When the secondary radio upgrade is completed, remove the USB flash drive, power cycle the secondary
radio and wait for it to become standby.
5. Using the Hardware Manual Lock switch, force the secondary radio to active.
6. Insert the USB flash drive with the new software release into the primary radio host port .
7. Power cycle the primary radio. The radio will be upgraded with the new software.
8. When the primary radio upgrade is completed, remove the USB flash drive, power cycle the primary
radio and wait for it to become standby.
9. When the upgrade process is complete, set the Hardware Manual Lock switch to the Auto position. The
secondary radio will remain active and the primary radio will remain standby. To set the primary radio
to active, use the hardware lock switch to select the primary radio and wait for it to become active,
then set the hardware manual lock switch to the Auto position.
Routine Maintenance
Temperature Test
Check the transmitter temperature (see Monitoring > Radio ‘Transmitter Current Temperature’ on
page 318). The normal operating range is 0 to 70 °C.
Connections
Check that all connections including earthing, interfaces and RF connectors are secure.
Transmit Power
Check the transmitter output power (see Monitoring > Radio ‘Transmitter Last TX Packet Forward Power’
on page 318). This value will be dependent on the output power setting, the ATPC setting, the temperature
and the VSWR of the antenna.
The actual average transmit power can be measured by using a spectrum analyser with average power
measurement capability. Connect the radio antenna output to the spectrum analyser input via an attenuator
of at least 30 dB.
Transmit Frequency
Check the base station radio transmit frequency according to your routine maintenance schedule. It is
recommended that this be done within two years of installation.
Aprisa SR+ software release 1.9.0 and later contain CLI commands to adjust the transmit frequency if
necessary.
This procedure requires a frequency counter with an accuracy of 0.1 ppm or better. Do not attempt this
adjustment without a counter of this stability.
Transmit Spectrum
Check the transmit output spectrum with a spectrum analyser. Look for any visible intermodulation
particularly in adjacent channels.
Note that adjacent channel power measurements require a laboratory grade spectrum analyser and cannot
be performed with field instruments.
Note: The TIA-568B wiring is the most commonly used and matches the cables we supply.
Note: Do not connect Power over Ethernet (PoE) connections to the Aprisa SR+ Ethernet ports as this will
damage the port.
RS-232 Pinout
Note: The TIA-568B wiring is the most commonly used and matches the cables we supply.
Aprisa BOP Interface - DCE DTE Customer Interface DCE Customer Interface
RJ45 Pin Pin Function Direction Pin Function DB9 Male Pin Function DB9 Female
Number Pinout Pinout
1 (*) RTS Input TXD 3 RXD 2
2 DTR / Sleep Input DTR / Sleep 4 DSR / Sleep 6
Mode Mode Mode
3 (*) TXD Input TXD 3 RXD 2
4 Ground Ground 5 Ground 5
5 DCD Output DCD 1
6 RXD Output RXD 2 TXD 3
7 DSR Output DSR 6 DTR 4
8 CTS Output CTS 8 RTS 7
(*) In RS-232 Bit Oriented mode, pins 1 and 3 of the RJ45 connector must be wired together.
Note: The TIA-568B wiring is the most commonly used and matches the cables we supply.
Pin Number 1 2 3 4
Function Ground A radio active Ground B radio active
1. Threshold Type
These alarm events have lower and upper limits. An alarm is raised if current reading is outside the limits.
Note: the limits for PA Current, TX AGC, TX Reverse Power and Thermal shutdown are not user configurable.
Alarm Events
Transmit Path Alarm Events
Event Event Display Default Configuration Function Recommended Actions
ID Text Severity Type
1 PA Current critical(1) Threshold Type Alarm to indicate that the Check antenna is not open or
current drawn by the shorted, check duplexer
transmitter power amplifier correctly connected and
is outside defined limits. tuned, if OK replace radio.
61 PA Driver Current critical(1) Threshold Type Alarm to indicate that the Check antenna is not open or
current drawn by the shorted, check duplexer
transmitter power amplifier correctly connected and
driver is outside defined tuned, if OK replace radio.
limits.
62 PA Stability warning(4) Threshold Type Alarm to indicate that the Check antenna is not open or
power amplifier is oscillating shorted, check duplexer
which may cause corruption correctly connected and
of the TX signal tuned, if OK replace radio.
2 TX AGC critical(1) Threshold Type Alarm to indicate that the Check antenna is not open or
variable gain control of the shorted, check duplexer
transmitter is outside correctly connected and
defined limits. tuned, if OK replace radio.
3 TX Reverse Power warning(4) Threshold Type Alarm to indicate that the Check antenna is not open or
antenna is not connected to shorted, check duplexer
the radio correctly connected and
tuned, and confirm VSWR at
TX port is less than 2:1. If
OK replace radio.
60 TX Forward warning(4) Threshold Type Alarm to indicate that the Check antenna is not open or
Power transmitter power is outside shorted, check duplexer
the selected TX power correctly connected and
setting. tuned, and confirm VSWR at
TX port is less than 2:1. If
OK replace radio.
4 Temperature warning(4) Threshold Type Alarm to indicate that the Check ambient temperature
Threshold transmitter temperature is and for airflow obstructions.
outside defined limits.
5 TX Synthesizer critical(1) Threshold Type Alarm to indicate that the Power off radio and restart.
Not Locked transmitter synthesizer is not If condition persists replace
locked. radio.
31 Thermal critical(1) Threshold Type Alarm to indicate that the Check ambient temperature
Shutdown transmitter has shutdown and for airflow obstructions.
due to excessively high
temperature.
90 VSWR Threshold warning(4) Threshold Type Alarm to indicate that there Check antenna is not open or
is a high SWR on the antenna shorted, check duplexer
port. correctly connected and
tuned.
Informational Events
Event Event Display Default Function Recommended Actions
ID Text Severity
26 User information Event to indicate that a user is Information
authentication (5) successfully authenticated on the radio No action required unless unexpected
succeeded during login. The information on the
user that was successfully
authenticated is provided in the
eventHistoryInfo object of the Event
History Log.
27 User information Event to indicate that a user has failed Check for possible intrusion attempt.
authentication (5) to be authenticated on the radio during If unexpected follow cyber incident
failed login. The information on the user that report procedure.
was unsuccessfully authenticated is
provided in the eventHistoryInfo object
of the Event History Log.
28 Protection switch information Event to indicate that a protection Investigate reason for switch over and
failed (5) switch-over cannot occur for some take remedial action.
reason. The reason for the failure to
switch is described in the
eventHistoryInfo object of the Event
History Log.
29 Software System information Event to indicate that the software has Information
Check (5) done a system check on the radio. Any No action required unless unexpected
information relevant to the cause of the
event is provided in the
eventHistoryInfo object of the Event
History Log.
30 Software Start Up information Event to indicate that the radio Information
(5) software has started. Any information No action required unless unexpected
relevant to the software start up is
provided in the eventHistoryInfo object
of the Event History Log.
33 Protection Switch information Event to indicate that a protection Investigate reason for switch over and
Occurred (5) switch-over occurs for some reason. take remedial action.
The reason for the switch-over is
described in the eventHistoryInfo
object of the Event History Log.
41 File Transfer information Event to indicate that a data file is Information
Activity (5) being transferred to or from the radio. No action required unless unexpected
42 Software information Event to indicate that software is being Information
Management (5) distributed to remote radios. No action required unless unexpected
Activity
43 Terminal Server information Event to indicate TCP packets are being Information
TCP Activity (5) transferred from the terminal server. No action required unless unexpected
55 Terminal Unit information Event to indicate a miscellaneous Information no action required unless
Information (5) activity occurring on the radio unexpected.
65 Event Action information Event to indicate an event action Information
Activity (5) occurring on the radio No action required unless unexpected
72 User SuperVisor information Event to indicate that a user has logged Information
Session Logout (5) out or the user session has timed out No action required unless unexpected
75 Config information Event to indicate that there has been Information
Management (5) some management activity related to No action required unless unexpected
Activity the configuration of the radio. As an
example, the configuration of the radio
has been changed via SNMP, or a new
configuration script has been loaded
into the radio.
78 Security information Security related events that occur on Refer to the event history logs for
Information (5) the radio. This may include events that details of the events.
report that a user account has been
locked or recovered. Or events related
to RADIUS authentication.
13. Specifications
RF Specifications
Blocking (desensitization), intermodulation, spurious response rejection, and adjacent channel selectivity
values determined according to the methods introduced in V1.7.1 of ETSI standards EN 300 113.
Frequency Bands
ETSI Compliant
Broadcast Band Frequency Band Frequency Tuning Synthesizer Step
Range Size
VHF 135 MHz 135-175 MHz 0.625 kHz
VHF 220 MHz 215-240 MHz 0.625 kHz
UHF 320 MHz 320-400 MHz 6.250 kHz
UHF 400 MHz 400-470 MHz 1.250 kHz
UHF 450 MHz 450-520 MHz 6.250 kHz
FCC Compliant
Broadcast Band Frequency Band Frequency Tuning Synthesizer Step
Range Size
VHF 135 MHz 135-175 MHz 0.625 kHz
VHF 220 MHz 215-240 MHz 0.625 kHz
UHF 400 MHz 400-470 MHz 1.250 kHz
UHF 450 MHz 450-520 MHz 6.250 kHz
UHF 700 MHz 757-758 MHz and 6.250 kHz
787-788 MHz
UHF 896 MHz 896-902 MHz (Note 1) 6.250 kHz
UHF 928 MHz 928-960 MHz (Note 1) 6.250 kHz
ISED Compliant
Broadcast Band Frequency Band Frequency Tuning Synthesizer Step
Range Size
VHF 135 MHz 135-175 MHz 0.625 kHz
VHF 220 MHz 215-240 MHz 0.625 kHz
UHF 400 MHz 400-470 MHz 1.250 kHz
UHF 896 MHz 896-902 MHz (Note 1) 6.250 kHz
(Note 1)
UHF 928 MHz 928-960 MHz 6.250 kHz
The Frequency Tuning Range is not an indication of the exact frequencies approved by FCC / ISED.
Note 1: The receive tuning range is specified. The transmit tuning range is 896 - 960 MHz.
Channel Sizes
ETSI Compliant
Note 1: It is the responsibility of the user to check for country regulatory of 50 kHz availability in this
frequency band.
Note 1: It is the responsibility of the user to check for country regulatory of 50 kHz availability in this
frequency band.
Note 1: It is the responsibility of the user to check for country regulatory of 50 kHz availability in this
frequency band.
FCC Compliant
Note 1: It is the responsibility of the user to check for country regulatory of 50 kHz availability in this
frequency band.
ISED Compliant
Note 1: It is the responsibility of the user to check for country regulatory of 50 kHz availability in this
frequency band.
Receiver
Receiver Sensitivity
BER < 10-2 64 QAM Max coded FEC -106 dBm -102 dBm -99 dBm -96 dBm
-2
BER < 10 64 QAM Min coded FEC -105 dBm -101 dBm -98 dBm -95 dBm
BER < 10-2 64 QAM No FEC -103 dBm -99 dBm -96 dBm -93 dBm
-2
BER < 10 16 QAM Max coded FEC -113 dBm -110 dBm -107 dBm -104 dBm
BER < 10-2 16 QAM Min coded FEC -112 dBm -109 dBm -106 dBm -103 dBm
-2
BER < 10 16 QAM No FEC -109 dBm -106 dBm -103 dBm -100 dBm
BER < 10-2 QPSK Max coded FEC -118 dBm -115 dBm -112 dBm -109 dBm
-2
BER < 10 QPSK Min coded FEC -117 dBm -114 dBm -111 dBm -108 dBm
BER < 10-2 QPSK No FEC -115 dBm -112 dBm -109 dBm -106 dBm
-2
BER < 10 4-CPFSK Max coded FEC NA NA NA NA
BER < 10-2 4-CPFSK Min coded FEC -117 dBm -114 dBm -111 dBm -108 dBm
BER < 10-2 4-CPFSK No FEC -115 dBm -112 dBm -109 dBm -106 dBm
BER < 10-6 64 QAM Max coded FEC -103 dBm -99 dBm -96 dBm -93 dBm
BER < 10-6 64 QAM Min coded FEC -101 dBm -97 dBm -94 dBm -91 dBm
-6
BER < 10 64 QAM No FEC -96 dBm -92 dBm -89 dBm -86 dBm
BER < 10-6 16 QAM Max coded FEC -110 dBm -107 dBm -104 dBm -101 dBm
-6
BER < 10 16 QAM Min coded FEC -108 dBm -105 dBm -102 dBm -99 dBm
BER < 10-6 16 QAM No FEC -102 dBm -99 dBm -96 dBm -93 dBm
-6
BER < 10 QPSK Max coded FEC -115 dBm -112 dBm -109 dBm -106 dBm
BER < 10-6 QPSK Min coded FEC -113 dBm -110 dBm -107 dBm -104 dBm
-6
BER < 10 QPSK No FEC -108 dBm -105 dBm -102 dBm -99 dBm
BER < 10-6 4-CPFSK Max coded FEC NA NA NA NA
-6
BER < 10 4-CPFSK Min coded FEC -113 dBm -110 dBm -107 dBm -104 dBm
BER < 10-6 4-CPFSK No FEC -108 dBm -105 dBm -102 dBm -99 dBm
Adjacent channel selectivity > -47 dBm > -37 dBm > -37 dBm > -37 dBm
-2
BER < 10 64 QAM > 43 dB > 53 dB > 53 dB > 53 dB
BER < 10-2 16 QAM > 43 dB > 53 dB > 53 dB > 53 dB
-2
BER < 10 QPSK > 48 dB > 58 dB > 58 dB > 58 dB
BER < 10-2 4-CPFSK > 55 dB > 65 dB > 65 dB > 65 dB
Co-Channel Rejection
Intermodulation response rejection > -35 dBm > -35 dBm > -35 dBm > -35 dBm
BER < 10-2 64 QAM > 55 dB > 55 dB > 55 dB > 55 dB
-2
BER < 10 16 QAM > 55 dB > 55 dB > 55 dB > 55 dB
BER < 10-2 QPSK > 60 dB > 60 dB > 60 dB > 60 dB
-2
BER < 10 4-CPFSK > 65 dB > 65 dB > 65 dB > 65 dB
Blocking or Desensitization
Blocking or desensitization > -17 dBm > -17 dBm > -17 dBm > -17 dBm
BER < 10-2 64 QAM > 73 dB > 73 dB > 73 dB > 73 dB
BER < 10-2 16 QAM > 73 dB > 73 dB > 73 dB > 73 dB
BER < 10-2 QPSK > 78 dB > 78 dB > 78 dB > 78 dB
BER < 10-2 4-CPFSK > 85 dB > 85 dB > 85 dB > 85 dB
Spurious response rejection > -32 dBm > -32 dBm > -32 dBm > -32 dBm
-2
BER < 10 64 QAM > 58 dB > 58 dB > 58 dB > 58 dB
BER < 10-2 16 QAM > 58 dB > 58 dB > 58 dB > 58 dB
-2
BER < 10 QPSK > 63 dB > 63 dB > 63 dB > 63 dB
BER < 10-2 4-CPFSK > 70 dB > 70 dB > 70 dB > 70 dB
Receiver spurious radiation > -57 dBm > -57 dBm > -57 dBm > -57 dBm
Transmitter
Max peak envelope power 10.0 W (+40 dBm)
(PEP)
Average Power output 64 QAM 0.01 to 2.5 W (+10 to +34 dBm, in 1 dB steps)
16 QAM 0.01 to 3.2 W (+10 to +35 dBm, in 1 dB steps)
QPSK 0.01 to 5.0 W (+10 to +37 dBm, in 1 dB steps)
(Note 1)
4-CPFSK 0.01 to 10.0 W (+10 to +40 dBm, in 1 dB steps)
Note: The Aprisa SR+ transmitter contains power amplifier protection which allows the antenna to be
disconnected from the antenna port without product damage.
Modem
Forward Error Correction Variable length concatenated Reed Solomon
plus convolutional code
Adaptive Burst Support Adaptive FEC
Adaptive Coding and Modulation
Duplexer Specifications
The specifications for the duplexers in the duplexer kits are:
Frequency
Code TX / RX Split Passband Tuning Lo Band Tuning Hi Band
Band
N0 135 MHz 4.6 MHz min split 0.5 MHz 135 - 175 MHz 135 - 175 MHz
A1 300 MHz 5 MHz min split 0.5 MHz 330 - 400 MHz 330 - 400 MHz
A2 300 MHz 20 MHz min split 3.5 MHz 330 - 400 MHz 330 - 400 MHz
B0 400 MHz 9.45 MHz min split 2 MHz 400 - 470 MHz 400 - 470 MHz
B1 400 MHz 5 MHz min split 0.5 MHz 400 - 470 MHz 400 - 470 MHz
M0 450 MHz 5 MHz min split 0.5 MHz 450 - 520 MHz 450 - 520 MHz
E0 700 MHz 30 MHz min split 7 MHz 757 - 788 MHz 757 - 788 MHz
E1 700 MHz 30 MHz min split 1 MHz 757 - 788 MHz 757 - 788 MHz
E2 700 MHz 30 MHz min split 757 - 788 MHz 757 - 788 MHz
G0 900 MHz 40 MHz min split 7 MHz 850 - 960 MHz 850 - 960 MHz
G1 900 MHz 9 MHz split 1 MHz 928 - 960 MHz 928 - 960 MHz
G2 900 MHz 9 MHz split 1 MHz 928 - 960 MHz 928 - 960 MHz
G3 900 MHz 5.5 MHz min split 0.5 MHz 928 - 960 MHz 928 - 960 MHz
G4 900 MHz 3.6 MHz split 0.5 MHz 928 - 960 MHz 928 - 960 MHz
G6 900 MHz 28 MHz min split 1 MHz 928 - 960 MHz 928 - 960 MHz
Interface Specifications
Ethernet Interface
The Aprisa SR+ radio features an integrated 10Base-T/100Base-TX layer-2 Ethernet switch.
To simplify network setup, each port supports auto-negotiation and auto-sensing MDI/MDIX. Operators can
select from the following preset modes:
• Auto negotiate
• 10Base-T half or full duplex
• 100Base-TX half or full duplex
The Ethernet ports are IEEE 802.3-compatible. The L2 Bridge (Switch) is IEEE 802.1d/q/p compatible, and
supports VLANs and VLAN manipulation of add/remove VLANs.
Note: Do not connect Power over Ethernet (PoE) connections to the Aprisa SR+ Ethernet ports as this will
damage the port.
The Aprisa SR+ radio’s ITU-T V.24 compliant RS-232 interface is configured as a Cisco® pinout DCE. The
interface terminates to a DTE using a straight-through cable or to a DCE with a crossover cable (null modem).
The interface uses two handshaking control lines between the DTE and the DCE.
The hardware alarms interface supports two alarm inputs and two alarms outputs.
Alarm Inputs
The alarm connector provides two hardware alarm inputs for alarm transmission to the other radios in the
network.
Alarm Outputs
The alarm connector provides two hardware alarm outputs for alarm reception from other radios in the
network.
Protect Interface
The Protect interface is used to connect the radios to the protection switch within a Protected Station. It
is not a customer interface.
Power Specifications
Power Supply
Aprisa SR+ Radio
Power Consumption
Note: The radio power consumption is very dependent on transmitter power, the type of traffic and network
activity.
Aprisa SR+ Protected Station and Aprisa SR+ Data Driven Protected Station
Note: The product label shows a Hardware Type of ‘Type A’ for the ‘Standard’ product
The product label shows a Hardware Type of ‘Type B’ or greater for the ‘Power Optimized’ product
Power Dissipation
Aprisa SR+ Radio
Aprisa SR+ Protected Station and Aprisa SR+ Data Driven Protected Station
General Specifications
Environmental
Operating temperature range -40 to +70˚ C (-40 to +158˚ F)
Storage temperature range -40 to +85˚ C (-40 to +185˚ F)
Operating humidity Maximum 95% non-condensing
Acoustic noise emission No audible noise emission
Mechanical
Compliance
ETSI
FCC
Radio 47CFR part 24, part 27, part 90 and part 101
Private Land Mobile Radio Services
EMC 47CFR part 15 Radio Frequency Devices, EN
301 489-1 and 5
Safety UL / EN 60950-1:2006
Class 1 division 2 for hazardous locations
Environmental ETS 300 019 Class 3.4
IEEE 1613 Class 2
IEC 61850-3
Ingress Protection IP51
ISED
This symbol appears on Electrical and Electronic Equipment (EEE) as part of the WEEE (Waste EEE) directive.
It means that the EEE may contain hazardous substances and must not be thrown away with municipal or
other waste.
15. Copyrights
Mirrored Bits® is a registered trademark of Schweitzer Engineering Laboratories, Inc