I am still new to ePMP equipment as I have only used either Canopy PMP100, AirmaxM or AirmaxAC gear for PtMP. I am evaluating ePMP 4000 series and have found the ePMP 4525 SM radios to be a nightmare to do field configurations and pre-install evaluations with.
Our standard process right now with AirmaxAC is to always do a pre-install live signal check evaluation at the customer site. This helps us determine which tower they can see or not see and which AP on the tower is best. It also lets us know the RSSI and the modulation rates of the device. As most experienced installers know RSSI is not the end all of determining if the link is a good one or not.
On AirmaxAC it is very simple to do. I have all our APs set with the same long random WPA2 key that is then stored in our default SM configuration file. All we then have to do for installing is customize the device name and any other network settings and then just change the SSID to the AP from the pre-install survey. For UI gear the SSID is separate from the WPA2 key in the device.
For pre-install evaluations we just use a portable battery pack to power the SM via 24v POE and then connect to the SM’s built-in wifi management radio. From there I use either the GUI or their mobile app (UISP) to login to the SM and then run the Site Survey tool. It then lists the RSSI of the seen APs which I then select the one I want to test with. It shows me a screen then with the new SSID and the WPA2 key which I can then keep the same as already programmed in the SM or change it if needed. I then apply the change and the SM comes up on the selected SSID and I can do signal, modulation, and alignment tests.
Conversely on ePMP 4525 it is not anywhere close to that simple and it actually is probably the most non-user friendly as it can be.
On the SM under Configuration->Security there is a place to select the Wireless Security Type as WPA2 and then enter a WPA2 Key. I assumed this is the default key that the SM GUI will use when selecting the Preferred AP. I thought that because if you have a Preferred AP configured on the SM you get the message “Preferred APs configured. Security Options not Available.” However, that is not the case as I came to find out.
I went to our outdoor test site with a pre-configured SM that has no Preferred AP configured. I then powered the SM up with a portable battery pack connected to a Mikrotik mAP so I could use wifi to manage the SM via my cellphone.
After the SM booted up I connected using my phone browser to the SM GUI and went to Tools->eAlign where after a few minutes the AP I was testing for showed up in the list. I then clicked on Add to make the AP the Preferred AP of the SM, but then the GUI asked me to enter the AP WPA2 key. Since I use long random keys on my APs I have no idea on what the password is. I wrongly expected the SM to auto-populate that field with the WPA2 key stored in the Configuration->WPA2 key field. Since it did not I guess I wonder what is the actual function of the WPA2 key in the Security section?
I then thought that maybe the cnArcher tool would be the way to go. Maybe it did some things the GUI did not do. Well that was a failure as well. The tool was able to see the SM but when I went to do a Quick Scan it would fail as it uses a proxy to the SM GUI to give that information. I have my SMs all set to use HTTPS on a non-standard port. The cnArcher tool only uses HTTP so it cannot connect via that proxy to my SM for doing the scan. I am then left trying to then configure the SM using the web GUI on a cellphone where it is not really that well optimized for.
I suggest a few simple changes to both the SM GUI and to the cnArcher tool that would easily fix this.
- When selecting a Preferred AP, pre-populate the WPA2 field with the key stored under Configuration->Security. I can then change it if the AP has a different key than the one stored.
- Allow cnArcher tool to use HTTP or HTTPs.
Honestly the ePMP 4000 series GUI needs a lot of usability tweaks in other areas as I find the GUI sub-par, but at least making some minor changes to make installation and pre-evaluation of sites much easier is not too much to ask.
Frankly things like this make me pause as I now have to weigh the performance of the ePMP 4000 platform vs the extreme non-user friendly nature of the software.