Cisco Urwb fm1000 Gateway Usermanual
Cisco Urwb fm1000 Gateway Usermanual
(Formerly Fluidmesh)
Edition 1.8 | Firmware 1.3.4
Copyright © Cisco and the Cisco logo are trademarks or registered trademarks of
Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco
trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party
trademarks mentioned are the property of their respective owners. The use of the
word 'partner' does not imply a partnership relationship between Cisco and any
other company. (1110R) © 2018–2020 Cisco Systems, Inc. All rights reserved.
Table of Contents
1. HAZARDOUS CONDITION WARNINGS ........................................................... 6
1.1. Water Ingress Hazard ............................................................................. 7
1.2. Radio-Frequency Transmission Hazard .................................................... 8
1.3. Optical Radiation Hazard ........................................................................ 9
1.4. Hot Surfaces Hazard ............................................................................. 10
2. Reporting Mistakes And Recommending Improvements .................................... 11
3. Getting Started .............................................................................................. 12
3.1. Introduction .......................................................................................... 12
3.1.1. Cisco FM1000 Gateway ............................................................... 12
The Cisco FM1000 Gateway Gateway .............................................. 12
Introduction .................................................................................... 12
Product Specifications ..................................................................... 13
Transceiver And Gateway Unit Power Consumption .......................... 13
3.2. Fluidmesh Architecture ......................................................................... 14
3.2.1. Overview ..................................................................................... 14
Wireless Network Architectures ........................................................ 14
3.2.2. Fluidmesh Technologies ............................................................... 14
Prodigy .......................................................................................... 14
3.3. Fluidmesh Network Addressing ............................................................. 15
3.3.1. Bridge IP Addressing ................................................................... 15
3.3.2. Unit Identification And Addressing ................................................. 15
Mesh-Capable Gateway Identification ............................................... 15
Network Addressing ........................................................................ 17
Fluidmesh Gateways ................................................................. 18
Configuring The Local Gateway Units ............................................... 19
VLAN Tagging ................................................................................ 21
Connecting And Configuring An Ethernet Edge Device ...................... 21
Fluidmesh Gateway Devices ...................................................... 22
4. Hardware Installation ..................................................................................... 23
4.1. Fluidmesh Hardware Installation ............................................................ 23
4.1.1. The Role Of The Gateway In A Fluidmesh Network Architecture ...... 23
4.1.2. Installing The Cisco FM1000 Gateway ........................................... 24
Connecting To The Unit Hardware .................................................... 24
4.1.3. Best Practice For Shielded CAT5/6 Connectors .............................. 27
4.1.4. Supplying Power To The Cisco FM1000 Gateway ........................... 28
Connecting Power To The Cisco FM1000 Gateway ........................... 28
Connecting Power Through The Device Power Ports ................... 29
4.1.5. Rebooting The Firmware And Resetting The Unit To Factory
Defaults ............................................................................................... 29
Device Firmware Reboot ................................................................. 29
5. Using The Fluidmesh Partner Portal ............................................................... 31
5.1. Accessing The Partner Portal ................................................................ 31
5.2. Enabling Two-Factor Authentication For Security .................................... 32
5.3. Administering Plug-In License Codes ..................................................... 34
5.4. Using The RACER™ Radio Configuration Interface ................................. 34
5.5. Viewing The Technical Documentation For Your Fluidmesh Device ........... 34
6. Device Configuration Using The Configurator Interface .................................... 36
6.1. Software And Hardware Prerequisites .................................................... 38
6.2. Accessing The Cisco FM1000 Gateway For Device Configuration ............ 38
6.2.1. Local Access And Login For Initial Configuration ............................ 39
6.2.2. Initial Configuration With The Unit In Provisioning Mode .................. 42
© 2021 Cisco and/or its affiliates. All rights reserved. Page 3 of 138
6.3. Switching Between Offline And Online Modes ......................................... 48
Uploading A Device Configuration File From FM Racer ............................ 49
6.4. Viewing And Accessing The FM Monitor Settings .................................... 50
6.5. General Settings ................................................................................... 52
6.5.1. The General Mode Window .......................................................... 52
Changing The Operational Mode ...................................................... 53
Operational Mode Settings On A Gateway Unit ........................... 53
Changing The LAN Parameters ........................................................ 53
6.6. Network Control .................................................................................... 53
6.6.1. FM-QUADRO .............................................................................. 53
FM-QUADRO For Mesh Network-Capable Devices ........................... 53
Plotting And Interpreting The Wireless Links ..................................... 54
Viewing Live Data For A Radio Or Wireless Link ................................ 58
Viewing Live RSSI Data For A Wireless Link ..................................... 61
Manipulating The FM-QUADRO View ............................................... 62
Changing The Relative Position Of Device Icons ............................... 62
Showing KPI Values For Wireless Links ............................................ 63
Adding An Aerial Map To The FM-QUADRO View ............................. 64
Adjusting The Transparency Of The Aerial Map View ......................... 65
Exporting A Network Representation File .......................................... 66
6.6.2. Advanced Tools ........................................................................... 67
Using The Ping Test Tool ................................................................. 67
Using The Bandwidth Test Tool ........................................................ 68
Using The Path MTU Discovery Tool ................................................ 69
6.7. Advanced Settings ................................................................................ 70
6.7.1. ................................................................................................... 70
6.7.2. Static Routes ............................................................................... 70
6.7.3. Pass Lists And Block Lists ............................................................ 71
6.7.4. Multicast ..................................................................................... 75
Multicast Management For Gateway Devices .................................... 75
Configuring Multicast Within A Layer-3 Network ................................ 76
6.7.5. SNMP Configuration .................................................................... 77
Using SNMP V2c ............................................................................ 78
Using SNMP V3 .............................................................................. 79
6.7.6. RADIUS Configuration ................................................................. 80
6.7.7. NTP Configuration ....................................................................... 83
6.7.8. L2TP Configuration ...................................................................... 84
6.7.9. VLAN Settings ............................................................................. 85
VLAN Configuration ........................................................................ 85
Rules For Packet Management ........................................................ 87
6.7.10. Fluidity Settings ......................................................................... 88
6.7.11. Miscellaneous Settings ............................................................... 90
6.8. Management Settings ........................................................................... 91
6.8.1. View Mode Settings ..................................................................... 91
6.8.2. Changing The Administrator Username And Password ................... 94
6.8.3. Overwriting And Upgrading The Unit Firmware ............................... 95
6.8.4. Plug-In Management .................................................................... 98
6.8.5. The Device Status View ............................................................. 101
The Device Status Window ............................................................ 101
6.8.6. Saving And Restoring The Unit Settings ...................................... 103
6.8.7. Resetting The Unit To Factory Defaults ........................................ 105
Rebooting The Unit ....................................................................... 106
6.8.8. Logging Out .............................................................................. 106
6.8.9. Viewing The End-User License Agreement .................................. 107
© 2021 Cisco and/or its affiliates. All rights reserved. Page 4 of 138
7. Software Plug-Ins ........................................................................................ 109
7.1. Available Plug-Ins ............................................................................... 109
7.2. Plug-In Management Procedures .......................................................... 113
7.2.1. Plug-In Activation ........................................................................ 113
7.2.2. Deactivating An Active Plug-In ..................................................... 115
7.2.3. Reactivating A Deactivated Plug-In .............................................. 117
7.2.4. Sharing License Codes And Accepting Shared License Codes ....... 118
8. Troubleshooting ........................................................................................... 119
8.1. I Cannot Get The Log-In Screen ........................................................... 119
8.2. I Cannot Log In To The FM Racer Interface ........................................... 119
8.3. I Forgot The Administrator Password .................................................... 119
8.4. I Purchased A Fluidmesh Device, But It Is Not Shown In FM Racer ........ 120
8.5. I Cannot Connect My Fluidmesh Device To The FM Racer Interface ....... 120
8.6. I Applied Configuration Settings To The Device Using FM Racer, But I
Have Lost Connection To The Device In FM Racer. ..................................... 120
8.7. How Do I Connect An Existing Pre-FM Racer Device To FM Racer? ....... 121
9. Electrical Power Requirements ..................................................................... 122
10. Heat Radiation Data .................................................................................. 125
11. FCC And CE Compliance Certificates ......................................................... 127
12. Notices And Copyright ............................................................................... 129
13. Fluidmesh End-User License Agreement ..................................................... 131
13.1. Preamble ......................................................................................... 131
13.2. Notice .............................................................................................. 131
13.3. Definitions ........................................................................................ 131
13.4. License Grant ................................................................................... 132
13.5. Uses And Restrictions On Use ........................................................... 132
13.6. Open-Source Software ...................................................................... 133
13.7. Termination ...................................................................................... 133
13.8. Feedback ......................................................................................... 134
13.9. Consent To Use Of Data .................................................................... 134
13.10. Warranty Disclaimer ........................................................................ 135
13.11. Limitation Of Liability ....................................................................... 135
13.12. Exclusion Of Liability For Emergency Services .................................. 136
13.13. Export Control ................................................................................ 136
13.14. General .......................................................................................... 137
14. Contact Us ................................................................................................ 138
© 2021 Cisco and/or its affiliates. All rights reserved. Page 5 of 138
HAZARDOUS CONDITION WARNINGS
IMPORTANT
In some jurisdictions, operation of any or all hardware that may
be described in this manual may be subject to the following
conditions:
1. The hardware may not cause harmful interference.
2. The hardware must accept any interference, including
interference that may cause undesired operation.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 6 of 138
HAZARDOUS CONDITION WARNINGS
CAUTION
In all circumstances where the Cisco FM1000 Gateway will be
installed in an outdoor location, it is compulsory to mount the
Cisco FM1000 Gateway inside an FM-SHIELD auxiliary
mounting kit.
The FM-SHIELD auxiliary mounting kit is a proprietary
Fluidmesh solution, and is designed specifically to assure the
long-term durability and reliability of compatible radio
transceivers that have been installed in outdoor environments.
If you need further information regarding the recommended
usage of FM-SHIELD, contact your Fluidmesh Networks
representative.
Relevant technical specifications for FM-SHIELD can be found
in the Fluidmesh FM-SHIELD installation manual.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 7 of 138
HAZARDOUS CONDITION WARNINGS
WARNING
The system shown in this manual is designed to be installed
and operated in a way that avoids contact with the antennas by
human beings. The legislation quoted in this section is
designed to reduce overall exposure of human beings to RF
radiation.
This section gives minimum separation distances between
antennas and humans. It is strongly recommended that the
system be installed in a location where these minimum
separation distances can be maintained at all times.
United States: This system has been evaluated for RF
exposure for humans, in accordance with FCC regulation CFR
47 Part 2.1091. To maintain compliance, the minimum
separation distance from the antenna to general bystanders is
20cm/7.9in. (all FM Ponte kit and x200 radio transceivers), or
21cm/8.3 in. (all FM1300 Otto and x500 radio transceivers).
Canada: This system has been evaluated for RF exposure for
humans, in accordance with ISED regulation RSS-102. To
maintain compliance, the minimum separation distance from
the antenna to general bystanders is 20cm/7.9in. for all
Fluidmesh radio transceivers.
Europe / Australia / New Zealand: This system has been
evaluated for RF exposure for humans, in accordance with
standard EN 62232. To maintain compliance, the minimum
separation distance from the antenna to general bystanders is
20cm/7.9in. for all Fluidmesh radio transceivers.
Before activating any device capable of transmitting RF
signals, make sure that all persons and animals are protected
from possible RF exposure.
Make sure that all RF feeds are securely connected to an
appropriate antenna. Never activate any RF-capable device
that is not connected to an antenna.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 8 of 138
HAZARDOUS CONDITION WARNINGS
WARNING
If any Fluidmesh hardware device is equipped with one or
more fiber-optic transceiver modules, it is classified as a Class
1 laser product. It may use laser-emitting components and/or
very high-intensity light sources.
Do not look directly at the input/output end of the unit's SFP
connector, or at the input/output end of any fiber-optic cable.
Fiber-optic systems frequently use high-intensity light from
laser or LED sources that may cause temporary or permanent
blindness.
For additional guidance regarding the safe use of laser-based
and LED-based fiber-optic technology, refer to ANSI Z136.2
(Safe Use of Optical Fiber Communication Systems Utilizing
Laser Diode and LED Sources).
© 2021 Cisco and/or its affiliates. All rights reserved. Page 9 of 138
HAZARDOUS CONDITION WARNINGS
WARNING
The outer surfaces of transceiver and gateway unit enclosures
may become hot during normal operation. During normal
operation, do not touch or handle the unit enclosure without
personal protective equipment.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 10 of 138
Reporting mistakes and recommending improvements
© 2021 Cisco and/or its affiliates. All rights reserved. Page 11 of 138
Getting Started
3. Getting Started
3.1. Introduction
3.1.1. Cisco FM1000 Gateway
Introduction
© 2021 Cisco and/or its affiliates. All rights reserved. Page 12 of 138
Getting Started
Product specifications
For detailed product specifications, refer to the product data sheet for the
Cisco FM1000 Gateway.
IMPORTANT
In service, transceiver and gateway units will consume power
at various levels between the quoted lower limit and upper
limit, depending on data traffic load, signal strength,
environmental conditions such as line-of-sight and atmospheric
moisture, and other factors.
Note that the power consumption of transceiver units tends to
be affected in inverse proportion to the unit temperature (in
other words, power consumption tends to rise when the
temperature of the unit falls, and the other way around).
© 2021 Cisco and/or its affiliates. All rights reserved. Page 13 of 138
Getting Started
Depending on the network design and the type of components used, the
Cisco FM1000 Gateway can be used to create wireless network
architectures, including:
• Point-to-point (P2P) links.
• Mobility networks.
Prodigy
© 2021 Cisco and/or its affiliates. All rights reserved. Page 14 of 138
Getting Started
IMPORTANT
The Cisco FM1000 Gateway features exclusive support for
Prodigy 2.0. The unit does not support Prodigy 1.0.
Also note that Prodigy 1.0 and Prodigy 2.0 are not compatible
with each other. Do not implement the two protocol versions
within the same network.
If you are expanding an existing network using a Cisco
FM1000 Gateway Gateway, make sure all components that are
part of the network are compatible with the Gateway by:
1. Upgrading all Fluidmesh radio transceivers within the
network to firmware version 6.5 or higher, and:
2. Configuring all Fluidmesh radio transceivers within the
network to operate using Prodigy 2.0.
As shipped from the factory, the wired ethernet ports of all Fluidmesh
hardware components are assigned the same default IP address of
192.168.0.10/24.
No default IP address is associated with the wireless interface.
In contrast to Fluidmesh products that can be set in Mesh Point and Mesh
End modes as needed, the Cisco FM1000 Gateway can only be set as a
Mesh End point.
Regardless of its configuration and operating mode, every Fluidmesh
device is shipped from the factory with a unique mesh identification (ID)
number (also called the Mesh ID). This number always takes the following
form:
5.a.b.c
The triplet a.b.c uniquely identifies the individual physical hardware unit.
The Mesh ID number is used to identify the physical hardware units within
the configurator interface that is used for configuration of the unit. Mesh ID
numbers cannot be changed.
Simplified network diagrams demonstrating the relationship between a
wired LAN and a linked mesh radio network containing a mesh end unit
and mesh point units are shown below. Figure 1 (page 16) shows a
typical Layer 2 network, while Figure 2 (page 17) shows a typical Layer 3
network.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 15 of 138
Getting Started
© 2021 Cisco and/or its affiliates. All rights reserved. Page 16 of 138
Getting Started
Network addressing
This section elaborates on the overall purpose and function of the Cisco
FM1000 Gateway by explaining the role of the FM1000 Gateway (and, if
included, the FM10000 Gateway) gateway device within a wireless
network.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 17 of 138
Getting Started
Fluidmesh gateways
NOTE
The system architecture shown above is to be regarded as
indicative only.
The FM1000 Gateway is necessary for the cluster to function if
the cluster aggregate throughput is greater than 350 Mbps, but
less than 1 Gbps. If throughput is less than 350 Mbps, a
Fluidmesh radio transceiver may be used to facilitate an L2TP
tunnel to the global gateway.
The FM10000 Gateway is only necessary as a global gateway
if the overall aggregate throughput value is between 1 Gbps
and 10 Gbps. If throughput is less than 1 Gbps, an FM1000
Gateway can replace an FM10000 Gateway as a global
gateway unit.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 18 of 138
Getting Started
NOTE
Every Fluidmesh hardware device has a factory-set IP address
of 192.168.0.10, and a Netmask of 255.255.255.0.
As a general rule, the core network routers and gateway units should be
configured to provide full IP reachability to each network segment. This
can be done by properly configuring the routing protocols that run on the
core network. This task is not covered in this manual, and will be the
responsibility of the person tasked with network management.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 19 of 138
Getting Started
Figure 4 (page 20) illustrates how the local subnet gateways can be
configured at each network segment:
• Network clusters (subnet gateways 10.140.65.0/27, 10.140.66.0/27
and 10.140.67.0/27): The gateway for each Fluidmesh device,
including the FM1000 Gateway, should be the standard one for the
local subnet used to reach other remote subnets belonging to any
or all of the remaining network clusters.To allow local devices to
reach mobile subnets, the local gateway should be provided with
routes toward the FM1000 Gateway in the same subnet, as in the
following typical example:
For subnet gateway 10.140.65.0/27, add route 10.140.254.0/27,
gateway 10.140.65.10 (the IP address of the FM1000 Gateway in
the subnet should be 10.140.65.10).
• On-board layer/mobile subnet (subnet gateway 10.140.254.0/27):
For each mobile network, the local gateway should be the
Fluidmesh mobile wireless radio transceiver. The transceiver must
not be provided with a default gateway, because the local gateway
will change dynamically while roaming from one cluster to another.
• Data-center network (subnet gateway 148.165.15.0/27): It is
assumed that this gateway is granted reachability to all network
cluster subnets. The local gateway must also be provided with all
© 2021 Cisco and/or its affiliates. All rights reserved. Page 20 of 138
Getting Started
VLAN tagging
Ethernet edge devices such as IP cameras and Wi-Fi access points can
be connected to the Ethernet ports of the Cisco FM1000 Gateway. Such
edge devices must be configured using the IP subnet scheme defined for
the broadcast domain.
The default IP subnet mask for all Fluidmesh devices is 192.168.0.0 /
255.255.255.0.
The default IP address for all Fluidmesh devices is 192.168.0.10 /
255.255.255.0.
You can configure any Ethernet device manually or automatically, using a
DHCP server that resides on the LAN network. The Fluidmesh network is
totally transparent to DHCP, therefore, DHCP requests and responses can
be forwarded transparently across the network.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 21 of 138
Getting Started
IMPORTANT
If an Ethernet-based system using multiple peripheral
components is connected to the wireless network, assign each
peripheral component a fixed IP address. If dynamic IP
addressing is used, the components may not be accessible to
third-party software that relies on the components for data
input.
A typical example is a video surveillance system equipped with
multiple CCTV cameras. Each camera must be assigned a
fixed IP address to be accessible to the video-recording
software.
The Cisco FM1000 Gateway features two Ethernet ports, located on the
front panel and rear panel of the unit. Usually, one port is connected to the
local network switch. The second can be used for configuration and
maintenance purposes.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 22 of 138
Hardware installation
4. Hardware installation
4.1. Fluidmesh hardware installation
4.1.1. The role of the Gateway in a Fluidmesh network architecture
The role of the FM1000 Gateway and FM10000 Gateway Gateways is to
connect defined clusters of Fluidity-capable networks where each network
resides in a different broadcast domain. The unit does this while allowing
enhanced data-transfer speeds.
A typical Fluidity-capable network is shown in Figure 5 (page 24). Within
this structure, an FM1000 Gateway or FM10000 Gateway Gateway acts
as the aggregation point for all tunnels, connecting all portions of the
infrastructure across layer-3 networks or wide-area networks.
The Gateway unit allows easy management of complex system
architectures. If your network is scaled up, the unit is capable of offering
the additional processing capabilities needed to enable complex data
traffic management. In Figure 5 (page 24), each broadcast domain is
considered to be a separate network with its own IP addressing schema.
The broadcast domains could be connected to the data center using any
type of network medium, including fiber-optic lines and wireless backhaul.
In the layout below, the Gateway unit functions as:
1. A bandwidth aggregator for the traffic flows coming from each
broadcast domain. The maximum aggregated bandwidth that the
FM1000 Gateway can support is 1 Gb/sec. In cases where higher
levels of bandwidth must be processed, a combination of FM1000
Gateway and FM10000 Gateway Gateways can be used within
the hierarchical network topology.
2. Since the trackside broadcast domains and the mobile networks
on board each vehicle can be configured as different IP subnets,
the Gateway unit serves as an IP reachability gateway,
guaranteeing the reachability of each IP address across the
entire network.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 23 of 138
Hardware installation
The front and rear panels of the unit contain controls and hardware
interfaces. The front panel is described in Figure 6 (page 25), and the
rear panel in Figure 7 (page 26). The table that follows each figure
explains the function of each relevant control and hardware interface.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 24 of 138
Hardware installation
© 2021 Cisco and/or its affiliates. All rights reserved. Page 25 of 138
Hardware installation
© 2021 Cisco and/or its affiliates. All rights reserved. Page 26 of 138
Hardware installation
CAUTION
To avoid the possibility of damage to network components due
to electrostatic discharge (ESD), it is extremely important that
all shielded CAT5/6 connectors are assembled according to
the standards and directives in this section.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 27 of 138
Hardware installation
CAUTION
When connecting the Cisco FM1000 Gateway to a power
supply, be sure to follow the instructions in this section at all
times.
Failure to follow these instructions may result in irreparable
damage to the unit and/or other connected hardware, and will
also invalidate the product warranty.
IMPORTANT
For technical data on which power sources are compatible with
the Cisco FM1000 Gateway, refer to “Electrical power
requirements” (page 122).
The Cisco FM1000 Gateway can be provided with power using the
following methods:
• A 12 Vdc/5A 60W power source.
When providing the power source for the Cisco FM1000 Gateway,
remember the following important points:
• Install the power source as close to the unit as possible to minimize
voltage drop. The maximum suggested distance is 50ft (15m).
NOTE
For detailed comparative information on which Fluidmesh
hardware devices are capable of accepting power
through IEEE 802.3at or IEEE 802.3af power sources, or
through a DC IN power source, refer to “Electrical power
requirements” (page 122).
© 2021 Cisco and/or its affiliates. All rights reserved. Page 28 of 138
Hardware installation
CAUTION
Do not connect a 24 Vdc or 48 Vdc power source to the unit
under any circumstances.
IMPORTANT
The following procedure shows how to do a 'hard' (device
firmware) reboot. To do a 'soft' (device software) reboot, refer
to “Resetting the unit to factory defaults” (page 105).
© 2021 Cisco and/or its affiliates. All rights reserved. Page 29 of 138
Hardware installation
© 2021 Cisco and/or its affiliates. All rights reserved. Page 30 of 138
Using the Fluidmesh Partner Portal
© 2021 Cisco and/or its affiliates. All rights reserved. Page 31 of 138
Using the Fluidmesh Partner Portal
© 2021 Cisco and/or its affiliates. All rights reserved. Page 32 of 138
Using the Fluidmesh Partner Portal
© 2021 Cisco and/or its affiliates. All rights reserved. Page 33 of 138
Using the Fluidmesh Partner Portal
IMPORTANT
For a detailed description of the differences between FM Racer
and the local Configurator interface, refer to “Device
configuration using the configurator interface” (page 36).
© 2021 Cisco and/or its affiliates. All rights reserved. Page 34 of 138
Using the Fluidmesh Partner Portal
© 2021 Cisco and/or its affiliates. All rights reserved. Page 35 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 36 of 138
Device configuration using the configurator interface
IMPORTANT
The FM Racer Radio Configuration interface and command-
line interface (CLI) contain device configuration parameters
that are not available in the on-board Configurator interface.
Note that some configuration features may not be applicable to
your specific Fluidmesh device.
Configuration parameters and control tabs that are exclusive to
FM Racer and the CLI include:
• Project name (The device has been assigned to the
Project listed in this field.)
• Position (Shows the current physical location of the
unit.)
• Invoice No. (Shows the Fluidmesh sales invoice
number for the unit.)
• Shared With (If responsibility for the unit is shared with
other users, the details of the responsible users are
shown in this field.)
• Enable RTS Protection (FM3500 Endo and FM4500-
series transceivers only - shows the unit’s current IEEE
802.11 request-to-send (RTS) setting.)
• Promisc ('Promiscuous' Mode: Shows the unit’s current
setting for backwards compatibility with legacy
Fluidmesh units that are no longer in production.)
• Noise floor Calibration (Shows the unit’s current noise
floorcalibration setting.)
• MAX Transmission MCS (Used to choose the
modulation and coding scheme by which the unit
automatically chooses its maximum data transmission
rate.)
• TX Power (Controls the effective isotropic radiated
power output of the unit.)
• Automatic link distance (Lets the system choose the
maximum effective distance between the relevant
wireless links.)
• Ethernet speed (Selects the correct data exchange
speed for each Ethernet port.)
• FLUIDMESH WI-FI tab (Allows you to set up a second,
segregated Wi-Fi interface that allows technicians
access to the unit for configuration and maintenance
purposes.)
• FLUIDITY ADVANCED tab (Allows you to adjust the
load-balancing, handoff and network optimization
characteristics of a transceiver unit.)
• FLUIDITY POLE BAN tab (Allows you to greatly reduce
sudden degradations in bandwidth that happen when a
mobile unit approaches, then leaves behind, a static
unit.)
© 2021 Cisco and/or its affiliates. All rights reserved. Page 37 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 38 of 138
Device configuration using the configurator interface
NOTE
If your computer has a wireless WiFi card, you may have to
disable the card to avoid routing issues between the
computer's wired and wireless network interfaces.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 39 of 138
Device configuration using the configurator interface
IMPORTANT
Due to rising levels of cyber crime, most
modern web browsers are built to alert you to
possible threats, such as hacking, spoofing
and identity theft.
Because the Cisco FM1000 Gateway is
connected to the computer using an
unsecured connection (in this case, a CAT5/6
cable), the web browser may show you
security warnings like the one above.
This is normal and expected. During the
configuration process, it is safe to ignore
these warnings.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 40 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 41 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 42 of 138
Device configuration using the configurator interface
NOTE
By default, the local IP address of the unit is set as
192.168.0.10, and the subnet mask is set as 255.255.255.0 (as
shown in the Current IP Configuration section).
In Provisioning Mode, the unit connects to the cloud server
through a WebSocket connection with 4 096-bit asymmetric
encryption and verified security certificates, protecting the
communication from cyber-security threats.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 43 of 138
Device configuration using the configurator interface
NOTE
DHCP is disabled when the unit leaves Provisioning Mode.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 44 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 45 of 138
Device configuration using the configurator interface
If the unit cannot connect to the internet using the DHCP fall-back
configuration settings, the RACER™ Cloud connection info Status will
be shown as Disconnected (Figure 21 (page 46)).
© 2021 Cisco and/or its affiliates. All rights reserved. Page 46 of 138
Device configuration using the configurator interface
NOTE
Each individual Fluidmesh radio transceiver unit has a factory-
set mesh identification number that takes the form 5.w.x.y.
If the unit's IP address is set to 169.254.x.y/24 as in Case 2
below, the values x and y represent parts x and y of the unit's
mesh identification number.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 47 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 48 of 138
Device configuration using the configurator interface
4. To switch the radio to the chosen mode, click the Confirm button.
• A ten-second countdown will be shown.
• The Configurator interface web page will reload.
• The unit will be switched to the chosen configuration mode.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 49 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 50 of 138
Device configuration using the configurator interface
IMPORTANT
FM Monitor cannot be used to configure Fluidmesh gateway
and radio transceiver devices. Fluidmesh devices can be
configured using any of the following methods:
• You can apply a pre-created Cloud-based configuration,
or do manual configuration of a device, using the FM
Racer interface. For instructions on how to use the FM
Racer interface, refer to the Cisco FM Racer
Configuration Manual.
• You can manually configure a device by using the
device’s built-in Configurator interface. For instructions
on how to use the Configurator interface, refer to the
relevant section of this manual.
• You can do command-line-based manual configuration
of a device by using the device’s built-in CLI interface.
For instructions on how to use the CLI interface, refer to
the Fluidmesh Command-line interface user manual.
To view and access the FM Monitor settings, do the steps that follow:
© 2021 Cisco and/or its affiliates. All rights reserved. Page 51 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 52 of 138
Device configuration using the configurator interface
The LAN Parameters box (below) contains the entry controls for local-
address setting.
NOTE
When the General Mode window is opened for the first time,
the Local IP and Local Netmask LAN parameters will be
factory-set default values.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 53 of 138
Device configuration using the configurator interface
IMPORTANT
For detailed information on the operational concepts that
govern Fluidity, refer to the Cisco Ultra-Reliable Wireless
Backhaul Fluidity Specifications document.
NOTE
The statistical information refresh period is:
• One second for Fluidity (mobile) networks.
• Six seconds for stationary networks.
To plot and interpret all wireless links in the current network, click the FM
QUADRO™ link in the upper left part of the settings menu (below).
© 2021 Cisco and/or its affiliates. All rights reserved. Page 54 of 138
Device configuration using the configurator interface
IMPORTANT
If you are working within a Fluidity Layer-3 network cluster, and
the network cluster has more than one Mesh-end radio, access
FM-QUADRO through the Configurator interface of the
cluster's Primary Mesh-end.
Find the Primary Mesh-end by comparing the Mesh ID values
of the Mesh-end radios. The Primary Mesh-end will have a
numerically lower Mesh ID value than the Secondary Mesh-
end.
If you access the FM-QUADRO interface belonging to the
cluster's Secondary Mesh-end, the network topology view will
be shown, but some statistics and configuration information
may not be available for viewing.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 55 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 56 of 138
Device configuration using the configurator interface
IMPORTANT
The KPI thresholds that govern tooltip border color cannot be
changed.
If you need to adjust KPI thresholds to custom values, you
must use FM Monitor as the primary network monitoring tool.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 57 of 138
Device configuration using the configurator interface
Wireless LAN link lines are colored according to the link’s performance
relative to its currently configured KPI thresholds:
• If LER is less than or equal to 15%, PER is 0%, and RSSI is greater
than or equal to -81 dBm, link performance is optimal, and the link
line will be green.
• If LER is between 15% and 30% or RSSI is between -86 dBm and
-81 dBm, link performance is acceptable, and the link line will be
orange.
• If LER is greater than 30%, PER is greater than 0%, or RSSI is less
than -86 dBm, link performance is below standard, and the link line
will be red.
IMPORTANT
The KPI thresholds that govern wireless link line color cannot
be changed.
If you need to adjust KPI thresholds to custom values, you
must use FM Monitor as the primary network monitoring tool.
The device elements shown in the main view are interactive. To get
additional real-time information on any Fluidmesh device or wireless link,
click its icon or tooltip.
• For stationary radio transceivers, an information sidebar will be
shown on the right side of the view (a typical sidebar is shown
below).
© 2021 Cisco and/or its affiliates. All rights reserved. Page 58 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 59 of 138
Device configuration using the configurator interface
NOTE
Only one radio information sidebar can be shown at any
time.
NOTE
A maximum of two radio information widgets can be
shown at any time.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 60 of 138
Device configuration using the configurator interface
When an RSSI information chart is shown for a wireless link, the chart
shows the following information:
• The bold dashed line on the upper part of the graph is the RSSI
envelope for the wireless link between the relevant mobile radio and
the stationary radio to which it is currently connected.
• The solid lines on the upper part of the graph are RSSI readings for
other stationary and mobile radios that are part of the network.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 61 of 138
Device configuration using the configurator interface
• The table on the lower part of the information chart contains device
identification and real-time RSSI readings for other stationary and
mobile radios that are part of the network.
1. Click the Zoom icon on the upper right part of the FM-QUADRO
view (upper icon, below).
1. Click the Edit Mode icon on the upper right part of the FM-
QUADRO view (below).
© 2021 Cisco and/or its affiliates. All rights reserved. Page 62 of 138
Device configuration using the configurator interface
TIP
If needed, you can add an aerial image to the
FM-QUADRO view. This allows you to
superimpose the network view over a map of
the terrain on which the network has been
installed.
For instructions on how to add an aerial
image, refer to “Adding an aerial map to the
FM-QUADRO view” (page 64).
4. When all device icons and tooltips are in the correct position, click
the Save or discard icon (below).
1. Click the Settings icon on the upper right part of the FM-
QUADRO view (below).
© 2021 Cisco and/or its affiliates. All rights reserved. Page 63 of 138
Device configuration using the configurator interface
You can add an aerial image to the FM-QUADRO view. This allows you to
superimpose the network map over a map of the actual terrain on which
the network has been installed, making it easier to visualize component
placement, line-of-sight between antennas, and other factors.
To add an aerial terrain map to the FM-QUADRO view, do the following
steps:
© 2021 Cisco and/or its affiliates. All rights reserved. Page 64 of 138
Device configuration using the configurator interface
1. Get an aerial image of the area in which the wireless network and
LAN are installed. The image must conform to the following
requirements:
• Image formats: *.PNG, *.JPG or *.SVG only.
• File size: Less than or equal to 150 Kilobytes.
TIP
Suitable aerial images can be created and
downloaded using Google Earth. Basic
instructions on how to use Google Earth are
available here.
You can adjust the transparency level of the aerial map view. This is a
useful way to increase the visual definition of device icons, tooltips and
link lines against strong background colors.
To adjust the transparency of the current aerial map view, do the steps
that follow:
© 2021 Cisco and/or its affiliates. All rights reserved. Page 65 of 138
Device configuration using the configurator interface
1. Click the Edit Mode icon on the upper right part of the FM-
QUADRO view (below).
You can export a representation file of the current network layout. This
allows Fluidmesh Technical Support to visualize the network for
troubleshooting purposes.
To export a representation of the current network, do the steps that follow:
© 2021 Cisco and/or its affiliates. All rights reserved. Page 66 of 138
Device configuration using the configurator interface
1. Click the Export as JSON icon on the upper right part of the FM-
QUADRO view (below).
IMPORTANT
The dialog contains important information
regarding confidentiality and FM-QUADRO
functionality. Read and understand the dialog
before clicking the Export button.
The Ping test can be run while the network is under load (to test
operational performance), or with the network unloaded (to test installed
capacity). To use the Ping test tool, do the following steps:
© 2021 Cisco and/or its affiliates. All rights reserved. Page 67 of 138
Device configuration using the configurator interface
2. Enter the IP address of the other unit in the Ping (10 packets
only) field (Figure 25 (page 68)).
The Bandwidth test can be run with the network under load (to test
operational performance), or with the network unloaded (to test installed
capacity). The test tool generates a stream of packets at a rate of 4
Mbits/sec to test available network path throughput.
IMPORTANT
Bandwidth rate computation is CPU-intensive, and must be
regarded as indicative only. Note that bandwidth testing tends
to underestimate the actual link throughput.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 68 of 138
Device configuration using the configurator interface
The Path MTU discovery tool tests the size of the maximum transmission
unit (in other words, the largest protocol data unit that can be
communicated in a single network layer transaction).
To use the Path MTU discovery tool, do the following steps:
© 2021 Cisco and/or its affiliates. All rights reserved. Page 69 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 70 of 138
Device configuration using the configurator interface
The Pass list or Block list function is a security feature that prevents fake
IP addresses from intercepting or intruding on the network.
A Pass list is a group of Fluidmesh transceivers, described as a list of
linked pairs. Within the list, each transceiver unit is considered a valid hop
in the routing table. If a Pass list is created, all transceiver units that are
not on the Pass list are excluded from packet routing.
Conversely, a Block list is a group of Fluidmesh transceivers that are
excluded by the routing table computation, and to which data packets
must not be routed. If a Block list is created, all transceiver units that are
on the Block list are excluded from packet routing.
IMPORTANT
The same Pass list or Block list must be applied to all
transceiver units that are part of a defined network.
Failure to use the same Pass list or Block list may cause units
to incorrectly receive, or be incorrectly excluded from, network
traffic.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 71 of 138
Device configuration using the configurator interface
If a Pass list or Block list is applied to a network, the list must be created
as a *.CSV file before being uploaded to each unit in the network. This
procedure is described below.
To create a Pass list or Block list, do the following steps:
IMPORTANT
Source and destination values are always unit
ID numbers. Do not enter a unit's IP address
as a source or destination value.
The unit ID number is printed on the
identification label of each unit. This number
always takes the following form: 5.a.b.c
© 2021 Cisco and/or its affiliates. All rights reserved. Page 72 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 73 of 138
Device configuration using the configurator interface
To upload a Pass list or Block list using the Configurator interface, do the
following steps:
To apply the list settings contained in the *.CSV file, click the Apply
Settings button.
To clear the Pass list or Block list settings without deleting the *.CSV file,
click the Clear Pass list or Block list button.
To delete the Pass list or Block list *.CSV file, click the Reset button.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 74 of 138
Device configuration using the configurator interface
6.7.4. Multicast
Multicast management for gateway devices
Multicast is a group-communication method in which data transmissions
are addressed simultaneously to more than one destination computer.
Multicast transmissions can be point-to-multipoint, or multipoint-to-
multipoint.
By default, if CCTV cameras and devices that operate in a similar fashion
are linked to a Fluidmesh transceiver unit operating in Mesh Point mode,
the unit forwards all multicast traffic generated by the cameras to the
closest Mesh End unit in the wireless network.
Note that the Cisco FM1000 Gateway operates in Mesh End mode only.
By default, Fluidmesh devices operating in Mesh End mode do not
forward multicast traffic to a wireless network. The only exceptions to this
rule are universal plug and play (UPnP) and Internet Group Management
Protocol (IGMP) traffic.
To redirect traffic flow from the Cisco FM1000 Gateway to a Mesh Point
unit, all multicast flow redirection information must be specified using the
Multicast settings.
To set multicast rules on the unit, do the following steps:
© 2021 Cisco and/or its affiliates. All rights reserved. Page 75 of 138
Device configuration using the configurator interface
1. Identify all Mesh End units belonging to each subnet cluster in the
Layer-3 network.
2. Enable upstream (vehicle to infrastructure) Multicast traffic by
adding multicast route 224.5.5.5 / 5.a.b.c to the Mesh End unit in
each subnet cluster, where 5.a.b.c is the actual Mesh ID number
of the global gateway unit.
IMPORTANT
If TITAN is enabled at core network level and dual-
redundant global gateway units are installed, do not
enter the global gateway's actual Mesh ID number as
the Destination Address. Instead, use Destination
Address 5.0.0.0
© 2021 Cisco and/or its affiliates. All rights reserved. Page 76 of 138
Device configuration using the configurator interface
NOTE
5.255.255.255 is the wildcard address for all Mesh ID
destinations within the network.
IMPORTANT
The same SNMP configuration must be set for all Fluidmesh
units in the wireless network.
For detailed information on Fluidmesh unit SNMP
configuration, refer to the Fluidmesh SNMP FM-MIB OID Table
and MIB configuration files. These can be downloaded from
the Fluidmesh Partner Portal (Documentation section > User
Manuals > Advanced Manuals.)
NOTE
By default, Fluidmesh units are shipped from the
factory with SNMP disabled.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 77 of 138
Device configuration using the configurator interface
To change the unit's SNMP mode to v2c and configure the unit
accordingly, do the following steps:
1. Click the SNMP mode drop-down, and click the v2c option.
• The SNMP v2c settings dialog will be shown (Figure 35
(page 78)).
IMPORTANT
The same community identity value must be set for
all Fluidmesh units in the wireless network.
IMPORTANT
The NMS host to which traps are sent must have an
SNMP agent that is configured to collect SNMP v2c
traps.
4. You can also configure the unit to send SNMP traps at defined
periodic intervals. If needed, enable periodic SNMP traps by
checking the Enable SNMP periodic trap: check-box, and enter
the name of the network management station (NMS) host in the
NMS hostname: field.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 78 of 138
Device configuration using the configurator interface
Using SNMP v3
To change the unit's SNMP mode to v3 and configure the unit accordingly,
do the following steps:
IMPORTANT
The same SNMP v3 user name must be set for all
Fluidmesh units in the wireless network.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 79 of 138
Device configuration using the configurator interface
IMPORTANT
The same SNMP authentication protocol must be set
for all Fluidmesh units in the wireless network.
IMPORTANT
The same encryption protocol must be set for all
Fluidmesh units in the wireless network.
IMPORTANT
The NMS host to which traps are sent must have an
SNMP agent configured to collect v2c traps.
8. You can also configure the unit to send SNMP traps at defined
periodic intervals. If needed, enable periodic SNMP traps by
checking the Enable SNMP periodic trap: check-box, and enter
the name of the network management station (NMS) host in the
NMS hostname: field.
9. Save the SNMP settings by clicking the Save button.
Alternatively, clear the settings by clicking the Reset button.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 80 of 138
Device configuration using the configurator interface
IMPORTANT
Use of this window requires extensive familiarity with the
RADIUS networking protocol. Do not change these settings
unless there is a specific need to do so.
To change the RADIUS settings for the Fluidmesh unit, do the following
steps:
© 2021 Cisco and/or its affiliates. All rights reserved. Page 81 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 82 of 138
Device configuration using the configurator interface
CAUTION
The same NTP configuration must be set for all Fluidmesh
units in the wireless network.
If the same NTP settings are not applied to all units, the
network may encounter timestamp conflicts and/or equipment
malfunctions.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 83 of 138
Device configuration using the configurator interface
IMPORTANT
The NTP server host names shown in Figure 38
(page 84) are for reference purposes only. Your
company policy may dictate that you use one or more
specific time servers.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 84 of 138
Device configuration using the configurator interface
IMPORTANT
A detailed description of L2TP configuration methods is
beyond the scope of this manual. For detailed instructions on
how to set the L2TP configuration, refer to the Fluidmesh
Networks L2TPv3 Configuration Manual.
VLAN configuration
IMPORTANT
The VLAN feature must be enabled using a software plug-in
(Fluidmesh part number FM-VLAN). Contact your Fluidmesh
Networks representative for details.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 85 of 138
Device configuration using the configurator interface
IMPORTANT
For detailed information on the predefined rules for smart
VLAN packet management, refer to the “Rules for packet
management” (page 87) table at the bottom of this section.
To connect the unit to a VLAN that is part of the local wireless network, do
the following steps:
NOTE
The same Management VLAN ID must be used on all
Fluidmesh devices that are part of the same mesh
network.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 86 of 138
Device configuration using the configurator interface
The system classifies incoming data packets according to the following definitions:
Signaling Ethernet protocol type $8847 or $09xx
User All other traffic
Packet tagged with MVID Packet passed
Access port rules for incoming packets (Case and Action)
Untagged packet from Fluidmesh device Packet passed
Untagged packet, VID not configured Packet passed
Untagged packet, VID configured Packet tagged with specified VID
Tagged packet with valid VID Packet dropped
Tagged packet with null (0) VID Packet dropped
Access port rules for outgoing packets (Case and Action)
Tagged packet with configured and Packet passed
allowed VID
Packet from Fluidmesh device Packet passed
Tagged packet, port VID not configured Packet passed
Tagged packet with valid but disallowed Packet dropped
VID
Tagged packet with null (0) VID Packet dropped
Access port rules for incoming packets with unit in Smart Mode (Case and
Action)
Untagged packet If native VLAN = ON: Packet passed
(tagged with NVID)
© 2021 Cisco and/or its affiliates. All rights reserved. Page 87 of 138
Device configuration using the configurator interface
The Native VLAN enable setting is used to control whether the Management VLAN
should be tagged or not.
Untagged packet, to remote devices Pass packet to remote peer
Tagged packet (any VID), to remote Pass packet to remote peer with original
devices tag
Untagged packet, to local unit kernel If native VLAN = ON: Packet passed to
kernel, tagged with NVID
© 2021 Cisco and/or its affiliates. All rights reserved. Page 88 of 138
Device configuration using the configurator interface
IMPORTANT
The Unit Role: drop-down is set to Infrastructure
mode, and cannot be changed.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 89 of 138
Device configuration using the configurator interface
IMPORTANT
Support for FIPS, CANBUS, PROFINET and QNET are only
available if the corresponding plug-ins are installed. If the
corresponding plug-in is not installed, the check-box for the
relevant option will not be available.
The following plug-ins are needed to activate these features:
• CANBUS: FM-CANBUS
• PROFINET: FM-PROFINET
• QNET: FM-QNET
Note that FIPS support is not available for the FM1000
Gateway and FM10000 Gateway.
Contact your Fluidmesh Networks representative for details.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 90 of 138
Device configuration using the configurator interface
NOTE
It is not essential to specify the device name, but it is
strongly recommended. Failure to specify the device
name may make the unit difficult to recognize in
situations where more than one unit is being dealt
with at the same time (for example, when using
utilities such as the FMQuadro network map).
3. To enable CANBUS support for the unit, make sure the FM-
CANBUS plug-in is installed, then check the Enable CANBUS:
check-box.
4. To enable PROFINET support for the unit, make sure the FM-
PROFINET plug-in is installed, then check the Enable
PROFINET: check-box.
5. To enable QNET support for the unit, make sure the FM-QNET
plug-in is installed, then check the Enable QNET: check-box.
6. Save the miscellaneous settings by clicking the Save button.
Alternatively, clear the settings by clicking the Reset button.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 91 of 138
Device configuration using the configurator interface
IMPORTANT
Changing the default password to a strong password is an
extremely important step in preventing security breaches.
If you have logged into the configurator interface using default
login credentials, you will see a notification banner at the
bottom of the screen (Figure 43 (page 92)).
Click the banner to change the view mode credentials. You will
be taken to the VIEW MODE SETTINGS section.
To gain editing privileges for the View Mode settings window requires the
correct administrator user name and password. To change the
administrator user name and password for the current user, do the
following steps:
NOTE
The new password must be a minimum of eight
characters, and include at least one capital letter and
one number.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 92 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 93 of 138
Device configuration using the configurator interface
IMPORTANT
If you are logged in to the Configurator interface with
Administrator credentials, you can enable or disable
any device-configuration setting.
If you are logged in to the Configurator interface as
an ordinary user, you will be able to view the device-
configuration settings, but cannot change the
settings.
4. Save the view mode settings by clicking the Save button in the
Allow View Mode Settings section. Alternatively, clear the
settings by clicking the Reset button.
IMPORTANT
Changing the default password to a strong password is an
extremely important step in preventing security breaches.
If you have logged into the configurator interface using default
administrator's credentials, you will see a notification banner at
the bottom of the screen (Figure 46 (page 94)).
To change the Administrator's user name and password for the unit, do
the following steps:
© 2021 Cisco and/or its affiliates. All rights reserved. Page 94 of 138
Device configuration using the configurator interface
IMPORTANT
Keep the Administrator name and password in a safe
place. If the Administrator name and password are
lost, the only way to log in to the unit is to do a hard
reset.
If you need to do a hard reset, refer to “Resetting the
unit to factory defaults” (page 105) for more
information.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 95 of 138
Device configuration using the configurator interface
CAUTION
Overwriting the firmware of any electronic device must be done
with great care, and always contains an element of risk.
It is not advisable to overwrite the firmware on a functioning
Fluidmesh unit unless a specific firmware-related issue needs
to be resolved.
IMPORTANT
To access firmware image files, you need an approved
Fluidmesh extranet account. To create an extranet account,
register for free at the Fluidmesh Partner Portal.
CAUTION
Make sure that you download the specific *.BIN file
for your device type. Uploading incorrect firmware for
the device type will cause the firmware overwrite to
fail, and may damage the unit.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 96 of 138
Device configuration using the configurator interface
CAUTION
Do not restart or power OFF the device while
firmware overwriting is in progress.
Restarting or powering OFF the unit before
overwriting is complete will permanently damage the
unit.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 97 of 138
Device configuration using the configurator interface
IMPORTANT
For a complete list of software plug-ins that are currently
available for the Cisco FM1000 Gateway, refer to “Available
plug-ins” (page 109).
© 2021 Cisco and/or its affiliates. All rights reserved. Page 98 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 99 of 138
Device configuration using the configurator interface
1. Enter the activation code for the plug-in in the Plug-in Activation
Code: field.
2. Click the Add button.
• The plug-in will be activated, and the plug-in functionality
can be used.
• A REMOVE link will be shown in red to the right of the
relevant plug-in description in the Plug-in List.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 100 of 138
Device configuration using the configurator interface
2. If needed, erase the log files for plug-in installation by clicking the
Clear Logs button in the Plug-in Installation Logs: section.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 101 of 138
Device configuration using the configurator interface
To download and forward the current diagnostic file for the unit, do the
following steps:
© 2021 Cisco and/or its affiliates. All rights reserved. Page 102 of 138
Device configuration using the configurator interface
3. Log a support call with the Fluidmesh Help desk. Ask for a
reference number.
4. Attach the *.FM diagnostic file to an E-mail, and enter the support
call reference number in the subject line of the E-mail. Send the
mail to [email protected].
IMPORTANT
Do not forward diagnostic files unless the Fluidmesh
Help desk requests them. If diagnostic files arrive
when they have not been requested, they cannot be
traced to specific problems.
To show the current device log for the unit, click the Show Logs button.
• The current device log will be shown in the Device Logs window
above the Show Logs button.
• The status messages shown in the log relate to possible Ethernet
port flapping, and will also alert you if duplicate IP addresses are
present in the LAN. Refer to the text below for a description of the
log messages.
NOTE
Ethernet port flapping is an issue in which the Ethernet
port goes offline and comes back online at an
excessively high rate within a given time period.
Some possible causes of this problem may be auto-
negotiation issues, chipset incompatibility, or faulty
CAT5/6 cabling.
Some status messages that may be shown in the log have the following
meanings:
• ethX phy:X is up/down: Ethernet port X is currently online/offline.
• chatter: VBR: duplicate IP A? MACX --> MAXY at <timestamp>:
Possible duplicate IP address 'A' has migrated from MAC address
'X' to MAC address 'Y', at the time shown.
IMPORTANT
Device software configuration (*.CONF) files are not
interchangeable with FM Racer configuration setup
(*.FMCONF) files.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 103 of 138
Device configuration using the configurator interface
TIP
Saved configuration files can be copied and distributed
for use on more than one Fluidmesh unit of the same
type, simplifying the configuration of other deployed
units.
Saved configuration files can also be used for
configuration backup. This can greatly speed up re-
deployment if a damaged unit must be replaced with a
unit of the same type.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 104 of 138
Device configuration using the configurator interface
The reset factory default window contains controls that allow you
to restore the Cisco FM1000 Gateway to its default factory settings (in
other words, to do a 'hard reset').
IMPORTANT
Doing a hard reset will revert all unit configuration settings,
including the unit's IP address and administrator password, to
factory defaults.
If you want to reboot the unit instead, refer to “Rebooting the
unit” (page 106) below.
CAUTION
Do not do a hard reset unless the unit needs
to be reconfigured using its factory
configuration as a starting point.
A hard reset will reset the unit's IP address
and administrator password, and will
disconnect the unit from the network.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 105 of 138
Device configuration using the configurator interface
The reboot window contains controls that allow you to reboot the Cisco
FM1000 Gateway (in other words, to re-start the unit's operating system).
To reboot the unit, do the following steps:
If clicked, the logout option logs the current user off the unit, and out of the
Configurator interface.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 106 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 107 of 138
Device configuration using the configurator interface
© 2021 Cisco and/or its affiliates. All rights reserved. Page 108 of 138
Software Plug-Ins
7. Software Plug-Ins
7.1. Available plug-ins
Like other Fluidmesh radio transceivers, the Cisco FM1000 Gateway is
able to take advantage of plug-in software upgrades that add features and
enhance the performance of the unit.
The following table lists all available software plug-ins for all Fluidmesh
hardware devices, their specific functions, and their plug-in part numbers.
The tables that follow this table describe which plug-ins are compatible
with specified Fluidmesh devices.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 109 of 138
Software Plug-Ins
© 2021 Cisco and/or its affiliates. All rights reserved. Page 110 of 138
Software Plug-Ins
The following tables describe which plug-ins are compatible with specified
Fluidmesh devices.
FM10000
Gateway
Gateway
Bandwidth Available Not available Available Available
Bandwidth Available Not available Available Available
upgrade
Fluidity- Not available Not available Not available Not available
Bandwidth
(Mobile)
Fluidity- Not available Not available Not available Not available
Bandwidth
(Trackside)
Fluidity Firmware Not available Not available Not available
embedded
4.9 GHz band Not available Not available Available Not available
© 2021 Cisco and/or its affiliates. All rights reserved. Page 111 of 138
Software Plug-Ins
FM10000
Gateway
Gateway
Licensed Not available Not available Available Not available
frequencies
World Not available Not available Available Not available
frequencies
AES Not available Not available Available Available
Fluidmesh Not available Not available Available Not available
Access Points
VLAN Firmware Available Available Not available
embedded
Virtual Gigabit Not available Not available Available Not available
L2TP Firmware Not available Available Not available
embedded
PROFINET Firmware Not available Available Not available
embedded
QNET Firmware Not available Available Not available
embedded
FIPS Not available Not available Available Not available
TITAN Available Not available Available Not available
UNII2 Not available Not available Available Not available
FM FM FM
FM3200 FM4200 FM4500
Endo Mobi Mobi
Bandwidth Available Available Available Available Available
Bandwidth Available Available Available Available Available
upgrade
Fluidity- Available Available Available Available Available
Bandwidth
(Mobile)
Fluidity- Available Available Available Available Available
Bandwidth
(Trackside)
Fluidity Available Available Available Available Available
4.9 GHz Available Available Available Available Not
band available
© 2021 Cisco and/or its affiliates. All rights reserved. Page 112 of 138
Software Plug-Ins
FM FM FM
FM3200 FM4200 FM4500
Endo Mobi Mobi
Licensed Available Available Available Available Available
frequencies
World Available Available Available Available Available
frequencies
AES Available Available Available Available Available
Fluidmesh Available Not Available Not Not
Access available available available
Points
VLAN Available Available Available Available Available
Virtual Not Not Not Not Not
Gigabit available available available available available
L2TP Available Available Available Available Available
PROFINET Available Available Available Available Available
QNET Available Available Available Available Available
FIPS Available Available Available Available Available
TITAN Available Available Available Available Available
UNII2 Available Available Available Available Available
© 2021 Cisco and/or its affiliates. All rights reserved. Page 113 of 138
Software Plug-Ins
© 2021 Cisco and/or its affiliates. All rights reserved. Page 114 of 138
Software Plug-Ins
TIP
If you cannot see the Project Name field, reduce the
magnification on the Plug-ins web page until all the
headings are visible.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 115 of 138
Software Plug-Ins
© 2021 Cisco and/or its affiliates. All rights reserved. Page 116 of 138
Software Plug-Ins
IMPORTANT
Only click the Force Deactivation button if you have
no way to retrieve the deactivation code (for
example, if the unit's boot sequence cannot be
completed, or if the unit is damaged and cannot be
powered ON).
© 2021 Cisco and/or its affiliates. All rights reserved. Page 117 of 138
Software Plug-Ins
If needed, you can share license codes with other Fluidmesh device
users, and also have other Fluidmesh device users share their license
codes with you.
To share one or more license codes with another Fluidmesh device user,
do the steps that follow:
If needed, you can also ask another device user to share one or more
license codes with you. If a License code is shared with you, it will be
listed on your Partner Portal Plug-ins web page.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 118 of 138
Troubleshooting
8. Troubleshooting
This section contains information that will allow you to solve common
problems associated with configuration and installation of Fluidmesh
products.
IMPORTANT
For a detailed description of the differences between the FM
Racer configuration interface and the local Configurator
interface, refer to “Device configuration using the configurator
interface” (page 36).
© 2021 Cisco and/or its affiliates. All rights reserved. Page 119 of 138
Troubleshooting
© 2021 Cisco and/or its affiliates. All rights reserved. Page 120 of 138
Troubleshooting
IMPORTANT
Please note that Cisco FM Ponte kit and FM1300 Otto
transceivers are not compatible with FM Racer.
To configure and maintain these transceivers, refer to the
Fluidmesh Installation and Configuration manual for the
specific device.
NOTE
As of October 2018, the most current firmware
versions are as follows:
• 1.2.1 (FM1000 Gateway and FM10000
Gateway gateways)
• 7.5.1 (FM FM1200 Volo)
• 8.2.1 (All FM x200 variants)
• 9.0.1 (All FM x500 variants)
© 2021 Cisco and/or its affiliates. All rights reserved. Page 121 of 138
Electrical power requirements
© 2021 Cisco and/or its affiliates. All rights reserved. Page 122 of 138
Electrical power requirements
IEEE X X X X
802.3af
PoE
(voltage
range at
PD: 37V to
57V)
IEEE X X X X
802.3at
PoE
(voltage
range at
PD: 42.5V
to 57V)
DC Permanent X
IN DC power,
min. 24V
max. 60V
EN 50155 X
compliance
at 48V
(voltage
range at
PD: 37V to
57V)
IEEE 802.3at X X X X X
PoE
(voltage
range at
PD: 42.5V to
57V)
© 2021 Cisco and/or its affiliates. All rights reserved. Page 123 of 138
Electrical power requirements
power, min.
24V
max. 60V
EN 50155 X X X X
compliance
at 48V
© 2021 Cisco and/or its affiliates. All rights reserved. Page 124 of 138
Heat radiation data
WARNING
The outer surfaces of some Fluidmesh units may become hot
during normal operation. Such units have a 'Hot Surfaces'
warning triangle on their outer enclosures.
During normal operation, do not touch or handle such unit
enclosures without personal protective equipment.
The following table shows nominal heat-radiation figures for all Fluidmesh
devices under idle conditions, and under full-load conditions.
All heat-radiation figures are given in British Thermal Units (BTU) per
hour.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 125 of 138
Heat radiation data
© 2021 Cisco and/or its affiliates. All rights reserved. Page 126 of 138
FCC and CE compliance certificates
© 2021 Cisco and/or its affiliates. All rights reserved. Page 127 of 138
FCC and CE compliance certificates
© 2021 Cisco and/or its affiliates. All rights reserved. Page 128 of 138
Notices and copyright
WARNING
Installation of Fluidmesh hardware devices and their
supporting infrastructure must be done by suitably qualified
personnel only. In some countries, installation by a certified
electrician may be required.
Fluidmesh hardware installations must comply with all
applicable local legislation.
WARNING
Never disassemble a Fluidmesh hardware device to any extent
that is not described in the relevant device user's manual.
Fluidmesh devices contain no user-serviceable parts.
Disassembling a Fluidmesh hardware device will invalidate the
device warranty, and may compromise the operational integrity
of the device.
On some Fluidmesh radio transceiver devices, the lower
access cover must be removed to gain access to the hardware
Reset button. Do not operate a radio transceiver device for
extended periods if its lower access cover has been removed.
WARNING
To avoid danger from non-ionizing radiation and/or electric
shock and/or high-intensity laser or LED light sources, be sure
to install the unit only in a location with restricted access.
WARNING
To avoid danger from electric shock, do not expose the unit to
water or high humidity if the unit is powered ON, or if any
access covers have been removed from the unit enclosure.
Do not place liquid-filled objects on or above the unit.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 129 of 138
Notices and copyright
© 2021 Cisco and/or its affiliates. All rights reserved. Page 130 of 138
Fluidmesh end-user license agreement
13.2. Notice
This is an agreement between you and Fluidmesh, a division of Cisco
(hereafter known as 'Fluidmesh').
You must read and agree to the terms of this firmware license agreement
(hereafter known as the 'agreement') before any Fluidmesh firmware can
be downloaded, installed or used. By clicking the 'Accept' button on any
Fluidmesh firmware download webpage, or by downloading, installing or
using Fluidmesh firmware and/or by using any Fluidmesh device running
Fluidmesh firmware, you are agreeing to be bound by the terms and
conditions of this agreement. If you do not agree with the terms and
conditions of this agreement, then you should not download, install or use
any Fluidmesh firmware, and you agree to forego any implied or stated
rights to download, install or use Fluidmesh firmware.
13.3. Definitions
For the purpose of this Agreement, the following terms shall have the
following meanings:
'Open Source Software' means any software or software component,
module or package that contains, or is derived in any manner (in whole or
in part) from, any software that is distributed as free software, open
source software or similar licensing or distribution models, including,
without limitation, software licensed or distributed under any of the
following licenses or distribution models, or licenses or distribution models
similar to any of the following: (a) GNU's General Public License (GPL) or
Lesser/Library GPL (LGPL); (b) the Artistic License (e.g., PERL); (c) the
Mozilla Public License; (d) the BSD License; and (e) the Apache License;
'Fluidmesh Device' means a Fluidmesh networking device that you
purchase or otherwise rightfully acquire;
'Fluidmesh Firmware' means the firmware in object code form made
available by Fluidmesh for Fluidmesh Devices; and
© 2021 Cisco and/or its affiliates. All rights reserved. Page 131 of 138
Fluidmesh end-user license agreement
'You' and 'Your' mean the company, entity or individual who owns or
otherwise rightfully acquires the Fluidmesh Device into which the
Fluidmesh Firmware will be incorporated.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 132 of 138
Fluidmesh end-user license agreement
Fluidmesh Devices must be properly installed and they are sold for
installation by a professional installer only. Fluidmesh Devices must be
installed by a professional installer of wireless networking products
certified by Fluidmesh, and they are not designed for installation by the
general public. It is your responsibility to follow local country regulations,
including operation within legal frequency channels, output power, and
Dynamic Frequency Selection (DFS) requirements. You are responsible
for keeping the devices working according to these rules.
(g) The Fluidmesh Firmware contains technological protection or other
security features designed to prevent unauthorized use of the Fluidmesh
Firmware, including features to protect against use of the Fluidmesh
Fimrware beyond the scope of the license granted herein, or in a manner
prohibited herein. You agree that you shall not, and shall not attempt to,
remove, disable, circumvent or otherwise create or implement any
workaround to, any such copy protection or security features.
This license is not a sale. Title and copyrights to the Fluidmesh Firmware,
and any copy made by you, remain with Fluidmesh and its suppliers.
Unauthorized copying of the Fluidmesh Firmware or the accompanying
documentation, or failure to comply with the above restrictions, will result
in automatic termination of this license and will make other legal remedies
available to Fluidmesh.
13.7. Termination
This license will continue until terminated. Unauthorized copying of the
Fluidmesh Firmware or failure to comply with the above restrictions will
result in automatic termination of this Agreement and will make other legal
© 2021 Cisco and/or its affiliates. All rights reserved. Page 133 of 138
Fluidmesh end-user license agreement
13.8. Feedback
You may provide suggestions, comments or other feedback ('Feedback')
with respect to Fluidmesh Firmware, and Fluidmesh Devices. Feedback,
even if designated as confidential by you, shall not impose any
confidentiality obligations on Fluidmesh. You agree that Fluidmesh is free
to use, disclose, reproduce, license or otherwise distribute and exploit any
Feedback provided by you as Fluidmesh sees fit, entirely without
obligation or restriction of any kind on account of intellectual property
rights, or otherwise.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 134 of 138
Fluidmesh end-user license agreement
© 2021 Cisco and/or its affiliates. All rights reserved. Page 135 of 138
Fluidmesh end-user license agreement
© 2021 Cisco and/or its affiliates. All rights reserved. Page 136 of 138
Fluidmesh end-user license agreement
13.14. General
This Agreement shall not be governed by the 1980 U.N. Convention on
Contracts for the International Sale of Goods. Rather, this Agreement
shall be governed by the laws of the State of Illinois, including its Uniform
Commercial Code, without reference to conflicts of laws principles. You
agree to the exclusive jurisdiction and venue of the State and Federal
courts in Illinois, United States.
This Agreement is the entire agreement between you and Fluidmesh, and
supersedes any other communications or advertising with respect to the
Fluidmesh Firmware and accompanying documentation. If any provision
of this Agreement is held invalid or unenforceable, such provision shall be
revised to the extent necessary to cure the invalidity or unenforceability,
and the remainder of the Agreement shall continue in full force and effect.
This Agreement and all documents, notices, evidence, reports, opinions
and other documents given or to be given under this Agreement
(collectively with this Agreement, 'Documents') are and will be written in
the English language only. In the event of any inconsistency between any
Document in the English language and any translation of it into another
language, the English-language Document shall prevail. If you are
acquiring the Fluidmesh Firmware on behalf of any part of the U.S.
Government, the following provisions apply: The Fluidmesh Firmware and
accompanying documentation are deemed to be 'commercial computer
software' and 'commercial computer software documentation' respectively,
pursuant to DFAR Section 227.7202 and FAR 12.212(b), as applicable.
Any use, modification, reproduction, release, performance, display or
disclosure of the Fluidmesh Firmware and/or the accompanying
documentation by the U.S. Government or any of its agencies shall be
governed solely by the terms of this Agreement and shall be prohibited
except to the extent expressly permitted by the terms of this Agreement.
Any technical data provided that is not covered by the above provisions is
deemed to be 'technical data-commercial items' pursuant to DFAR
Section 227.7015(a). Any use, modification, reproduction, release,
performance, display or disclosure of such technical data shall be
governed by the terms of DFAR Section 227.7015(b).
Fluidmesh is a trademark of Cisco Systems in the United States and
worldwide.
© 2021 Cisco and/or its affiliates. All rights reserved. Page 137 of 138
Contact us
14. Contact us
Worldwide Headquarters:
Fluidmesh Networks LLC
81 Prospect Street
Brooklyn, New York 11201
United States of America
Tel. +1 (617) 209 -6080
Fax. +1 (866) 458-1522
[email protected]
Technical Support desk: [email protected]
www.fluidmesh.com
Regional headquarters for Europe, the Middle East and Africa:
Tel. +39 02 0061 6189
Regional headquarters for the United Kingdom:
Tel. +44 2078 553 132
Regional headquarters for France:
Tel. +33 1 82 88 33 6
Regional headquarters for Australia and New Zealand:
Tel: +61 401 747 403
© 2021 Cisco and/or its affiliates. All rights reserved. Page 138 of 138