Professional Documents
Culture Documents
Wireless
Manager
Server
Administration
Guide
System Release
4.4 and Later
While reasonable efforts have been made to assure the accuracy of this document, Cambium Networks assumes
no liability resulting from any inaccuracies or omissions in this document, or from use of the information obtained
herein. Cambium reserves the right to make changes to any products described herein to improve reliability,
function, or design, and reserves the right to revise this document and to make changes from time to time in
content hereof with no obligation to notify any person of revisions or changes. Cambium does not assume any
liability arising out of the application or use of any product, software, or circuit described herein; neither does it
convey license under its patent rights or the rights of others. It is possible that this publication may contain
references to, or information about Cambium products (machines and programs), programming, or services that
are not announced in your country. Such references or information must not be construed to mean that Cambium
intends to announce such Cambium products, programming, or services in your country.
Copyrights
This document, Cambium products, and 3rd Party Software products described in this document may include or
describe copyrighted Cambium and other 3rd Party supplied computer programs stored in semiconductor
memories or other media. Laws in the United States and other countries preserve for Cambium, its licensors, and
other 3rd Party supplied software certain exclusive rights for copyrighted material, including the exclusive right to
copy, reproduce in any form, distribute and make derivative works of the copyrighted material. Accordingly, any
copyrighted material of Cambium, its licensors, or the 3rd Party software supplied material contained in the
Cambium products described in this document may not be copied, reproduced, reverse engineered, distributed,
merged or modified in any manner without the express written permission of Cambium. Furthermore, the
purchase of Cambium products shall not be deemed to grant either directly or by implication, estoppel, or
otherwise, any license under the copyrights, patents or patent applications of Cambium or other 3rd Party supplied
software, except for the normal non-exclusive, royalty free license to use that arises by operation of law in the sale
of a product.
Restrictions
Software and documentation are copyrighted materials. Making unauthorized copies is prohibited by law. No part
of the software or documentation may be reproduced, transmitted, transcribed, stored in a retrieval system, or
translated into any language or computer language, in any form or by any means, without prior written permission
of Cambium.
License Agreements
The software described in this document is the property of Cambium and its licensors. It is furnished by express
license agreement only and may be used only in accordance with the terms of such an agreement. See Legal
Notices and License Agreements.
All information pertaining to the WM server file system is presented for the server administrator
across the following documents:
Cambium Wireless Manager Quick Start Guide. This guide documents
− the system requirements
− the procedure for a fresh installation
− client device setup
− SNMP broadcast toggling
− starting and stopping the WM service
− launching the client
− setting up, monitoring, and troubleshooting initial discovery
− licensing WM software and the physical map
Cambium Wireless Manager Server Administration Guide. This guide documents
− starting and stopping the WM service
− port usage
− database administration
− server-side adjustments for
discovery
fault management
performance management
security management
the offline physical map
− server logs
− licensing and upgrading WM software
− backing up the system
− using the MIB browser
15
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
1.2 Chapters
This server administration guide is organized as follows:
Chapter 2, Management of the WM Server Device lists the ports that must be open in the firewall
settings on the server device and describes the
configuration that the server requires for
executing tools, for using the proper network
interface card, and for adapting to a new IP
address. It also emphasizes the importance of
deploying an uninterruptible power supply and
provides the location for placement of device
firmware package files.
Chapter 3, MySQL Database Administration describes how to configure, start, and initialize
the database and how to restore the WM
configuration and back up the database.
Chapter 4, Network Discovery Setup and Debug describes how to make server-side adjustments
to the way WM is configured for Discovery and
where to find Discovery-related debug messages.
Chapter 5, Predefined Information Structures for Device Support lists the structured information resources for
support devices included in the server file system.
16
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Chapter 9, Offline Physical Map Setup describes how to install and configure GeoServer,
create map layers from images, and prepare
layers for efficient panning and zooming.
Chapter 10, Optimization of WM Server Performance provides specific MySQL database configuration
parameter values that are recommended for all
operators and strongly recommended for
operators who manage large networks, and also
describes how to limit idle client time by
configuring automatic lockups and terminations
for sessions that are idle too long.
Chapter 11, User Scripts Setup provides the proper path and mode for mounting
operator-defined scripts on the server.
Chapter 12, Management of WM Server Logs describes how to manage logs that the server
logs.
Chapter 13, WM Software Upgrades and Downgrades describes how to upgrade WM to the next
release.
Chapter 14, WM Software and Feature Licensing describes the licensing and license management
schemes that the current release supports:
license types (WM server, physical maps, and
node packs), how to calculate the needed
quantities of these, and how the WM client
cautions the user of approaching license
deficiencies. This chapter also includes
information on how to replace the server license.
Chapter 15, WM Administrator Tool for Server Administration shows default values for fields of the tool panels
and describes how to set up WM to connect to
GeoServer and retrieve map images from it.
Chapter 16, MIB Browser Usage describes how to invoke, configure, and
troubleshoot the embedded MIB browser.
17
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
For documentation support with BAM integration, see the following documentation:
Cambium Wireless Manager Quick Start Guide
Procedure 42: To upgrade WM
Cambium Wireless Manager User Guide
18
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
For declarations of conformity for individual network elements in their various frequency
band ranges, see
− http://www.cambiumnetworks.com/support/ec-doc for EC conformity
− http://www.cambiumnetworks.com/support/weee-compliance for WEEE compliance
19
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Requirement type With ≤ 100 nodes With > 100 nodes Virtual machine
hardware class server, not desktop server, not desktop server, not desktop
21
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Special considerations for Certain packages are specifically considered problematic for
software installations a WM platform:
XEN virtualization software, in any WM
configuration
cluster packages, where the High Availability (HA)
configuration is implemented.
NOTES:
1. Cambium Technical Support cannot help a network operator customize an OS, for
example obtain special Linux library packages, to make WM work on an unsupported
version.
2. Although this is a 64-bit OS, it detects that WM is a 32-bit application and runs WM in
a 32-bit emulation environment.
22
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Requirement Supported
type
storage 15 MB
23
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
NOTES:
1. MacOS is not supported. The following additional OSs
are expected to work but have not been tested with the
client application:
Windows versions other than those shown above,
assuming they are 32-bit
CentOS 5.5 or 6.x, 32-bit
2. Use of an earlier JRE version with WM Release 4.0 SP 3
or later can result in an OutOfMemory error.
24
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
6900 Inbound TCP for TFTP connections in the firmware upgrade process.
25
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
NOTES:
3. Port number is reconfigurable in .../server/conf/WibbWMSConfiguration.xml.
4. Port number is reconfigurable in .../server/Apache/Tomcat/conf/server.xml.
5. Must be configured in .../server/conf/transportProvider.conf with WM
server stopped after WM installation.
6. Must be configured in .../server/conf/serverparameters.conf with WM server
stopped after WM installation.
7. Port number is reconfigurable in .../server/conf/licensing.xml.
As indicated in Note 3 and Note 4 above, the NMS Socket port and NMS FE Secondary port must be
configured after WM has been installed and stopped. To do so, perform the following steps.
5. Change its value from 0 to that of any available TCP port (for example, 32900).
26
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
27
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
28
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
29
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
30
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
may browse the client device file system to find and load additional .pkg3 files. The server
will allow those files to be then uploaded into the .../server/Tftp directory so that
they are listed the next time that Package Manager is launched in the client.
Given the two repositories for package files, each has the following potential advantage:
the files in the .../server/Tftp directory of the server are always automatically loaded
into Package Manager selection, regardless of any problems the operator may experience
with the Add operation in that utility.
the files selected in the client from anywhere in the client file system are available for
loading regardless of the any networking constraints or conditions that would inhibit
downloads from the server to the client.
31
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
WM encrypts the database password that is configured in the WM Administrator Tool. So, the
password string does not appear human readable anywhere in the server file system or the client
application.
33
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
The only supported backup is available as a click option (System Backup) in the WM Administrator
Tool. See Using the WM Server Panel.
34
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
The only supported restore is available as a click option (Restore System) in the WM Administrator
Tool. See Using the WM Server Panel. This option restores not only the database snapshot, but also
the essential files from the WM server file system.
35
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Procedure 12: To reclaim hard drive space from burgeoning database files
1. Review http://dev.mysql.com/doc/refman/5.0/en/innodb-data-log-reconfiguration.html.
36
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Procedure 13: To observe in the logs that a MySQL database table has become
corrupted
1. Navigate to the directory /usr/local/cambium/wm/server/logs in Linux or
C:\Cambium\WM\server\logs in Windows.
2. Look in the lo files for any of the following indications of table damage:
37
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
38
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
39
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Procedure 18: To adjust database values in Linux for optimal server performance
1. Open the WM Administrator Tool. (See WM Administrator Tool for Server Administration).
2. In the WM Server panel of the WM Administrator Tool, click the Stop WM Server button.
3. Log into the Linux system as root.
4. At the Linux command prompt, enter the following command:
service mysqld stop
5. Enter the following command:
mysqld_safe –key_buffer_size=2G
6. Enter the following command:
service mysqld start
7. In the WM Server panel of the WM Administrator Tool, click the Start WM Server button.
Procedure 19: To adjust database values in Windows for optimal server performance
1. In the WM Administrator Tool. (See WM Administrator Tool for Server Administration).
2. In the WM Server panel, click the Stop WM Server button.
3. From the Windows OS menu, open StartRun.
4. In the Open field of the Run dialog, enter services.msc.
5. In the resulting Services dialog, click the Standard tab.
6. Click to highlight the row of the WMMySQL service that is running.
7. Right-click the row and select Stop from the drop-down list of options.
8. Navigate the file system to the folder C:\MySQL Server 5.1\.
9. Right-click the file my.ini and select Open WithNotepad.
10. Select EditFind.
11. In the Find what text box, type innodb_.
12. Click the Find Next button.
13. Reset innodb attributes to the following values:
innodb_flush_log_at_at_trx_commit=2
innodb_log_buffer_size=1M
40
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
1
innodb_buffer_pool_size=2G
innodb_thread_concurrency=8
innodb_file_per_table=1
14. In the Services dialog, click to highlight the row of the WMMySQL service.
15. Right-click the row and select Start from the drop-down list of options.
16. When WMMySQL starts, click the Start WM Server button in the WM Administrator Tool.
1
Or 80% of the size of the physical memory in the machine, except not greater than 3.5G (GB) of user-level memory per
process in a 32-bit system.
41
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
After the Discovery module is initialized, some discovery event messages are available in the client
among the other network event messages. The Discovery Log tab of the Discovery Configurator in the
client provides the full set of discovery messages, as it displays the full contents of the
discoveryLogs.txt server file. However, for running scripts or making selected dumps, you may
find that access to this server file is more convenient.
43
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
In addition, some other Discovery-related messages are logged in the file stdoutN.txt in the same
directory. The following are example messages from this log:
[24 Aug 2010 03:14:11:103] DISCOVERY(10.100.13.92:213): Unable to write to
device while testing Write Community. Device is currently not writeable.
Device's Write Community must be set manually.
[24 Aug 2010 03:41:42:206] DEEPDISCOVERY(10.100.13.73:264): Device is 99%
discovery complete. OIDs timed out: 280
[24 Aug 2010 03:41:43:123] ERRORLOG_POLLMGR(83): Polling Delayed for 5
minutes. Deep Discovery is still running for 4 devices.
PROCESS com.motorola.wibb.ems.platform.server.starleaf.core.StarleafManager
ARGS INCREMENTAL_DEVICE_UPDATE_ON true FULL_DATA_REFRESH_INTERVAL 86400
44
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
45
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Per device type, the tolerances can be either the defaults that the device template has defined or
new ones that the server administrator has edited into the device template. Administrators who edit
device templates should keep in mind that the edits apply to all devices of the device type until
further edits are made.
The tolerance that you set is the distance in meters to the northwest, northeast, southwest, and
southeast from an element of this device type. WM will logically link the element to any element
configured by the attribute theirDeviceType in a KinLocation tag, if discovery finds that its geo-
location is within the tolerance (the value of the attribute tolerance_m in the tag). The following are
examples of tag contents in the context of their device specific template names:
- <DefineTemplate name="pmp.ap.location.proximity.logical.family">
- <!-- location-based automatic parent for PMP AP or 35 OFDM AP -
can be CMM3, CMM4, BHS, HSBHS, HSBHS150, PTP300S, PTP.500S, PTP800S
-->
<KinLocation kinshipType="parent"
myFieldSource="customUserProperties" myLatitudeName="Device
Latitude" myLongitudeName="Device Longitude"
theirDeviceType="PMP.CMM3" theirFieldSource="customUserProperties"
theirLatitudeName="latitude" theirLongitudeName="longitude"
theirSpecificType="any" tolerance_m="0.0" />
- <DefineTemplate name="cmm.location.proximity.logical.family">
- <!-- location-based automatic parent for CMM3 - can be BHS,
HSBHS, HSBHS150, PTP300S, PTP.500S, PTP800S
-->
<KinLocation kinshipType="parent"
myFieldSource="customUserProperties" myLatitudeName="latitude"
myLongitudeName="longitude" theirDeviceType="PMP.BHS"
theirFieldSource="customUserProperties" theirLatitudeName="Device
Latitude" theirLongitudeName="Device Longitude"
theirSpecificType="any" tolerance_m="0.0" />
46
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
- <DefineTemplate
name="ptp.slave.location.proximity.logical.family">
- <!-- location-based automatic child for PTP slaves e.g. HSBHS,
HSBHS150, PTP300S, PTP.500S - can be PMP 320 AP,PMP AP, CMM3, CMM4,
PMP 35 OFDM AP
-->
- <!-- BHS not included because they have different location
attributes
-->
<KinLocation allowSingleChildOnly="true" kinshipType="child"
myFieldSource="customUserProperties" myLatitudeName="latitude"
myLongitudeName="longitude" theirDeviceType="PMP.CMM3"
theirFieldSource="customUserProperties"
theirLatitudeName="latitude" theirLongitudeName="longitude"
theirSpecificType="any" tolerance_m="0.0" />
- <DefineTemplate name="BHS.location.proximity.logical.family">
- <!-- location-based automatic child for BHS - can be PMP 320
AP,PMP AP, CMM3, CMM4, PMP 35 OFDM AP
-->
<KinLocation allowSingleChildOnly="true" kinshipType="child"
myFieldSource="customUserProperties" myLatitudeName="Device
Latitude" myLongitudeName="Device Longitude"
theirDeviceType="PMP.CMM3" theirFieldSource="customUserProperties"
theirLatitudeName="latitude" theirLongitudeName="longitude"
theirSpecificType="any" tolerance_m="0.0" />
47
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
NOTES:
1. These templates configure how WM will recognize the device type during discovery and
how WM should represent the device type in the user interface. The templates in this
directory refer to and pull information from Base files in the templates subdirectory.
2. Unlike the templates, these reports do not support generic elements.
49
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
By default, the print option for Events and Alarms in Wireless Manager is not configured. To enable
printing, configuration must be done in NmsProcessesBE.conf file in the
/usr/local/cambium/wm/server/conf directory in Linux
(or the C:\Cambium\WM\server\conf folder in Windows). This will allow the current columns
of an alerts or events panel to be sent to a printer that exists in the network of the WM server (and
printing to a file in the file system of, or greater network of, the WM server). The following is an
excerpt from the NmsProcessesBE.conf file:
51
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
52
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
53
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Values
Arguments Description
Defaul
Options Notes
t
PRINT_COMMAND is
A valid & dependent on SAVE_DIR.
Used to specify the
existing When Print action is
directory in which Events
directory invoked from the client,
and Alerts viewed by the
SAVE_DIR name, with state the contents will be
client are to be saved,
the path, temporarily saved in a file
when the 'Save' option is
relative to printfile.tmp file under
invoked from the client.
WM_Home <SAVE_DIR> and then
printed.
The
Operating
Used to specify the
System
command to be executed,
specific
when the user invokes the PRINT_COMMAND is
PRINT_COMMAND command -
Print option from the dependent on SAVE_DIR.
that could
Event Viewer/Alert Viewer
invoke print
of Applet client.
action from
the system.
54
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Values
Arguments Description
Defaul
Options Notes
t
55
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Values
Arguments Description
Defaul
Options Notes
t
Whether to drop or
continue processing the
SNMP trap, if its
DROP_TRAP_WHILE_UNMANAGED true/false * false -
corresponding managed
object is in unmanaged
state.
56
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Values
Arguments Description
Defaul
Options Notes
t
Whether to enable /
V3_AUTH disable authentication for true/false * false -
SNMP v3 traps.
When an interrupt is
received to shut down the
Server, where some
Notifications are still
pending to be parsed and
filtered, how to deal with
GRACEFUL_SHUT_DOWN them - whether to true/false false -
(gracefully) shutdown
after completing the
further processing of these
Notifications or to stop
processing and allow for
abrupt shut down.
true - batch
Batch update is used when processing of
Events are to be added to Events is
the database as a batch so enabled
BATCH_UPDATE as to decrease the number *false -
of queries, thereby false - batch
enabling an increase in processing of
performance. Events is
disabled.
57
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Values
Arguments Description
Defaul
Options Notes
t
NOTE: * indicates that the option will not be present in NmsProcessesBE.conf by default.
58
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
7 Performance Management
Configuration
7.1 Managed Objects
The main input to the performance module is the Managed Objects that are created to represent
network devices. These Managed Objects are created by the Wireless Manager Topology module
when the discovery process takes place. Managed Objects hold details of network elements such as:
Name, Type, status, etc. Data collection is configured for these Managed objects in the Performance
module.
The startup options of the Performance Management module can be modified by editing the
parameters of the Collector process in the NmsProcessesBE.conf file located in the
/usr/local/cambium/wm/server/conf directory in Linux
(or the C:\Cambium\WM\server\conf folder in Windows).
note ............. If you have updated any of the configuration parameters, be sure to restart the Wireless
Manager Server.
The following are the parameters that you, as an administrator of the file system, can adjust after
deployment.
Parameter Description
This specifies the number of days after which the data collected
during polling (string data or stats data) have to be cleaned up. The
data older than the specified number of days will be removed from
CLEAN_DATA_INTERVAL the system. This deletes the table after the specified days that are
appended with the date. If a single table is used to store the data for
all the days, then that will not get deleted.
Default value : 7
This specifies the maximum number of times the system can try to
ping the device to retrieve its status. This indicates that request will
STATUS_POLL_PING_RETRIES be sent for STATUS_POLL_PING_RETRIES + 1 times.
Default value : 0
This specifies the maximum number of times the system can try to
perform SNMP ping to the device to retrieve its status. This indicates
STATUS_POLL_SNMP_RETRIES that request will be sent for STATUS_POLL_SNMP_RETRIES + 1 times
Default value : 0
To specify the time in seconds for the server to wait for the request
from host. This value is configured for ICMP Ping when native ping is
STATUS_POLL_PING_TIMEOUT disabled
Default value: 1 (i.e., will wait for one second if a particular node is
not reachable).
59
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Parameter Description
This specifies the maximum number of times the system can try to
ping the device to perform data collection (Polling). This indicates
DATA_COLLECTION_SNMP_RETRIES that request will be sent for DATA_COLLECTION_SNMP_RETRIES + 1
times.
Default value : 0
PolledData with the same Agent, Protocol and Period (APP) are
combined and depending on this parameter, number of polls to the
agent will be done. For example, if the MAX_OIDS_IN_ONE_POLL is
10 and the number of PolledData with the same APP is 20, then two
MAX_OIDS_IN_ONE_POLL sets of polls with the first set containing 10 and second with 10 will be
done, and the values will be stored in the table in which they are
intended to go.
Default value : 15
This specifies the fully qualified class name which has implemented
CUSTOMIZED_DATA_COLLECTOR
the interface CustomDataCollection.
60
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Parameter Description
Whenever a managed object is passed through Polling.conf, and
when it satisfies the match criteria specified in the first PollingObject,
PolledData will be created and will not check the match criteria given
in other PollingObjects. Setting the value as "true" for this parameter
PASS_THRO_ALL_POLLING_OBJECTS will make the ManagedObject to check all the match criteria in all the
PollingObjects. In this case, even if the match criteria of the first
PollingObject gets matched, the ManagedObject will be passed to the
subsequent PollingObjects also.
Default value : false
61
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Parameter Description
This parameter is used to specify the time period for which the server
has to wait (after it has got started) to start the status polling of
managed objects
This parameter can be used in cases where you have large networks
STATUS_POLL_DELAY to be discovered during server startup and you do not want the
server to be loaded with both discovery and status polling. By
configuring this parameter, you can postpone the status polling for
sometime.
Default value : 5 minutes
62
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Each of these custom reports must then be imported into the client application through a client
session from the server device, performing the user guide procedure titled "To import system
reports" and browsing to one or both of the folders whose path is noted above.
Any context or other problems in an operator-defined report may prevent the report from being
listed in, and thus available for launch from, the client. When you mount a custom report, you may
want to send a message to the clients (see the user guide section titled "Broadcasting a Message"),
advising users of the new report and reminding them to import it into the System Reports panel of
the client so that they will have access to it.
63
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
65
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
66
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
10. Right-click on the Users node in Security tree and click AddUser.
11. Create a new user Group1User with the password group.
12. In the final screen of the wizard, select Group1 under Assign Groups for the user field.
13. Click Finish.
You have now associated the user Group1User with the group Group1.
14. Click Finish to quit the Security Administration UI and the Wireless Manager client.
15. Log in to the client again, but this time with a user ID of Group1User and a password
of group.
16. Select ToolsSecurity Administration. The Security Administration window is displayed.
17. Select FileAddGroup.
67
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Wireless Manager displays a warning popup with the message Group1User is not
authorized to perform the operation. This occurs because we have disabled
this particular user from adding a new group.
18. Similarly, try removing an existing group. The same message is displayed.
19. Try removing an existing operation. The same message is displayed.
20. Close the client and shut down the server.
21. Set the authorization_for_security_administration argument to false in
NmsProcessesBE.conf file present in the
/usr/local/cambium/wm/server/conf directory in Linux (or the
C:\Cambium\WM\server\conf folder in Windows). This is the unauthorized mode.
22. Restart the server .
23. Log in to the client with user ID Group1User and password group.
24. Select ToolsSecurity Administration. The Security Administration window is displayed.
25. Try to add a new group.
You will be able to create the group and no error message is displayed. This is because no
authorization support is provided for performing the security operations alone.
68
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
So, operators who enforce new requirements will need to inform all the users about the changes. The
changes take effect the next time that the server is restarted.
Procedure 24: To enforce the password change requirement for first-time users
1. Browse to the /usr/local/cambium/wm/server/conf directory in Linux
or the C:\Cambium\WM\server\conf folder in Windows.
2. In the text editor of your choice, open the file NmsProcessesBE.conf for editing.
69
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Procedure 26: To restore the superuser account and the security tool cache
1. Ensure that the WM server is running.
note ............. The following step asks you to input a new superuser account name. Using the name
root is discouraged.
2. If the server device is on a Linux OS, perform the following steps:
a. Enter cd /usr/local/cambium/wm/server/bin.
70
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
71
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
73
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
74
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
To verify that GeoServer is properly connected to the stored image file, perform the following steps.
Procedure 30: To verify that GeoServer connects to the image data store
1. Under Services in the left panel of the GeoServer web interface, click GWC, which represents
GeoServer Web Cache.
The GeoWebCache web page opens.
2. Under Automatically Generated Demos, click A list of all the layers and automatic demos.
3. In the resulting table, find the layer that you created in this procedure.
4. Click one of the file formats in the OpenLayers column for your layer.
5. Inspect the image to verify that it is as intended.
6. Use the back button in your browser to return to the Layers web page.
To create an offline physical map layer from multiple images, perform the following steps.
75
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
note ............. Typically, the .bz2 version of the same data is significantly larger.
8. Save the file.
76
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
9. For Add columns for tags, select as many columns as would suit your needs.
10. Wait until the layers display in the Layers panel on the left side of the tool's interface.
11. Use Ctrl-click to select the layers whose names end with a polygon, then right-click and
select Save As.
12. For Format in the resulting dialog for Save vector layer as, select ESRI Shapefile.
13. Browse to and select the directory for the new .shp file.
77
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
6. Under Basic Store Info in the New Vector Data Source page
◦ if you selected Shapefile in Step 5, perform the following steps:
a) use the drop-down list to select the directory from Step 1.
b) for Data Source Name, type a memorable name into the text box.
c) for Description, type text that describes this data source.
◦ if you selected Directory of spatial files in Step 5, use the drop-down list to select the
directory that holds all the shape files.
78
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
7. For Shapefile location under Connection Parameters, specify the path and file name of the
shape file from Step 2:
GeoServer_Version/data_dir/data/workspace_name/copied_shapefile.shp
8. Click the Save button.
RESULT: The New Layer panel opens on the right.
79
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
80
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
81
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Procedure 39: To set a different max zoom level for the offline map
1. Navigate to C:\Cambium\WM\server\webclient\oakleaf\conf\ in Windows
or /usr/local/cambium/wm/server/webclient/oakleaf/conf/ in Linux.
2. Open the file AxelConfig.xml for editing.
3. Find the attribute maxZoomLevel.
4. Overwrite the current value with the desired value.
note ............. The default value is 16.
5. Save and close the file.
82
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
10 Optimization of WM Server
Performance
10.1 Optimizing MySQL Database Performance
The following are general recommendations for all operators, very strongly recommended for
operators of large networks. However, these recommendations apply only where the attribute is
currently set to a value that is smaller than the recommended value.
83
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
84
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
85
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
alert_audit.txt In this file, information about all the alerts that are updated through events
are logged. New alert generation, alert deletion etc., are printed.
discoveryLogs.txt In this file, all discovery related happenings are logged. Addition/removal of
Networks/nodes, starting of NetSearcher, nodes or networks discovered etc.,
are logged in this file.
mserr.txt MangementServer Framework related error messages are stored in this file.
nmserr.txt All important Web NMS related error messages are logged into this file.
nmsout.txt All important Web NMS related output messages are printed in this file. This
is quite a comprehensive log file which holds record of happenings right from
server startup to the shut down. Module specific output message belonging
to "POLL""POLICY" "TOPO"EVENT" "ALERT" "MAP" "CONFIG" "PROV" "MISC"
"AGENT" "CLI" modules are logged by default.
stderr.txt By default, System Error messages are directed to this file. That is, if you use
System.err.println("Message") in your module, the error messages are
directed to this file, by default.
87
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
stdout.txt By default, System Output messages are directed to this file. That is, if you
use system.out.println("Message") in your module, the output messages are
printed in this file, by default.
transactionLogs.txt All Prepared Statements obtained using the Connection Pool are recorded in
this file. By default, logging into transactionLogs.txt is disabled. To
enable it, edit the log4j.xml file and set Logging="true" for the
transactionLogs.txt entry.
By default, the following log files are present on the WM server in the
/usr/local/cambium/wm/server/logs directory in Linux
(or the C:\Cambium\WM\server\logs folder in Windows).
Although most of the important attributes to set are in the logging_parameters.conf file,
if you want WM to be able to send email, you will need to configure some attribute values in the file
/usr/local/cambium/wm/server/conf/log4j_conf.xml file in Linux
(or the C:\Cambium\WM\server\conf\log4j_conf.xml file in Windows).
These include
the value for the SMTPHost parameter. This is the IP address of the SMTP server that will
handle outbound email from the WM server.
the value of the To parameter. This is the account name and domain of the recipient of email
from the WM server.
the value of the From parameter. This is the account name and domain that WM will use for
itself as the sender.
<!-- MAIL APPENDER -->
<appender name="mail" class="org.apache.log4j.net.SMTPAppender">
<param name="EvaluatorClass"
value="com.adventnet.management.log.MessageBasedTEE"/>
<param name="To" value="webnms-admin@adventnet.com"/>
<param name="From" value="webnms-admin@adventnet.com"/>
<param name="BufferSize" value="512"/>
<param name="Subject" value="LOG4j mail testing"/>
<param name="SMTPHost" value="192.168.4.41"/>
<layout class="org.apache.log4j.PatternLayout">
<param name="ConversionPattern" value="[%d{dd MMM yyyy
HH:mm:ss:SSS}] %-5c{2}: %m%n"/>
</layout>
</appender>
<!-- MAIL APPENDER -->
88
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Cambium Networks provides an integrated installation tool for Linux platforms and a similar tool for
Windows platforms for downloading by operators who want to install WM and optionally Prizm. This
tool is made available as part of the license procurement process. For information on licensing the
software products, contact your Cambium representatives. Also see the section titled WM Software
and Feature Licensing of this guide.
important ........... For instructions on a fresh installation, use the Cambium Wireless Manager Quick
Start Guide for the release being installed.
89
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
5. Click Next.
The License Agreement panel opens.
6. If you agree to the terms written in the License Agreement panel (scroll to read the entire
text), click the radio button for I accept the terms of the License Agreement and click Next.
note ............. If your OS is not explicitly supported for this WM release, the wizard provides the following
pop-up message.
90
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
..................... If you want to install an explicitly supported OS in conjunction with the WM upgrade, see
Migration of Operator Data Through WM Upgrade Plus OS Upgrade.
7. Review the options in the Feature Selection panel.
note ............. In the next step, the tool detects the presence of the previous WM release,
License Manager, a MySQL Database on the device. Where these are present, the tool
will upgrade only Wireless Manager and leave the others as they presently exist.
Uncheck MySQL Database. If License Manager is already installed, uncheck it as well.
8. Leave the check box checked for each component that you want to install and click Next.
note ............. In the typical upgrade case, License Manager and the MySQL Database are still present
from the previous release, and the installation tool detects their presence.
91
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
9. When the tool prompts for whether you want to continue given that the previous release
was detected, click OK.
10. After the confirmation(s), the tool prompts for your current database authentication
information, which it requires for proper installation of the System Reports feature in this
release.
11. Either accept the default root password by clicking Next or overwrite it, then click Next.
12. Either accept the default database username and password by clicking Next or overwrite
them, then click Next.
92
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
13. Either accept the default read-only username and password and then click Next or overwrite
them, then click Next.
14. Ready to install panel opens. Click Next.
IT will install Wireless Manager on your system.
93
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
The installation wizard prompts for whether you want to start the Administrator Tool on the
final action page.
16. Mark the checkbox, if you want to launch Server Administration Tool after the installation is
finished. Do not mark it if you don’t want to launch the Server Administration Tool.
17. Click Finish.
The WM Administrator Tool opens if marked the checkbox to launch the Server Administration
Tool.
94
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
18. In the left panel of the WM Administrator Tool interface, click Licensing.
The Licensing configurator open in the right panel of the tool interface.
19. If you are deploying three license servers, click the Redundant License Server radio button.
If not, leave the License Server button checked.
In the steps that follow, refer also to Using the Licensing Panel.
95
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
20. For each License Manager (LM) server you are deploying, perform the following steps:
a. In the Hostname / IP text box, either
leave localhost, if the LM server is local to the WM server.
replace localhost with the dotted IP address of the LM server, if it is remote to
the WM server.
b. In the Server Port text box, either
leave the default 27000 as the server port of the LM server, where license
requests from WM will be processed.
replace 27000 with a port number that is unused in the LM server, if 27000 is or
may be used by another program.
c. In the Login Name text box, either leave the default lmadmin as the ID for the WM
Server Administrator Tool to use in authenticating itself to the LM server or replace it
with another ID.
d. In the Password text box, either leave the preconfigured password that is associated
with the lmadmin ID or replace it with another password for the Server Administrator
Tool to use in authenticating itself to the LM server.
e. In the Webserver Port text box, either
leave the default 27443 for secure connections from the WM server to the LM
web server.
replace 27443 with 27100 for non-secure connections to the LM web server.
21. In the License File Data panel of the WM Administrator Tool, click the Save Configuration
button.
The Administrator tool confirms the save operation.
22. In the License Actions block of the Licensing panel in the WM Administrator Tool interface,
click the Upload License button.
96
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
29. If you want WM to process authentication requests for PMP slave devices
a. procure a license to use BAM.
b. download Prizm software from
http://www.cambiumnetworks.com/support/management-tools/prizmbam/.
c. install Prizm Release 3.3 without the optional License Manager and Database
installations that the installation tool offers.
d. download Prizm documentation from the same site.
e. navigate to the .../Canopy/Prizm_bin directory.
f. launch the PrizmEMS Administrator Tool.
g. in the Server panel of the tool interface, set the Server Mode to BAM Only and click the
Save button.
h. from the main menu, select ActionPrizmEMS ServerStop.
i. verify that the services for License Manager and MySQL database are running.
j. in the License Manager panel of the PrizmEMS Administrator Tool, configure Prizm to
connect to the instance of License Manager that the WM installation tool installed.
k. in the Database panel of the PrizmEMS Administrator Tool
configure Prizm to connect to the MySQL database that the WM installation tool
installed.
if your WM server is on a Windows platform, then for Datasource Name (DNS),
enter prizm_mysql into the text box.
l. in the License Actions block of the Licensing panel of the WM Administrator Tool, select
Upload License. (See Using the Licensing Panel)
m. upload all of the following licenses
BAM server license
BAM packs
30. In the Server Actions block of the WM Server panel in the WM Administrator Tool, click the
Start WM Server button.
31. Optionally, close the WM Administrator Tool.
32. Launch your web browser.
33. Navigate to http://localhost:9090.
If the server has been properly configured, your browser will be redirected to the launch
web page.
97
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
If a problem exists, then this web page includes a warning. In this warning case, the Launch
WM Client operation may open an error message instead of the client interface. If this
occurs, click the license log link to troubleshoot the licensing configuration.
98
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
note ............. This backs up the server data to a new directory that the operation creates:
C:\Cambium\WM\server\backup\WM_Data_Backup\ or
/usr/local/cambium/wm/server/backup/WM_Data_Backup. The data file
that it places in the new directory is *.WMBACK.
9. Copy the following data to a repository on other than the server device:
◦ the output file *.WMBACK produced in Step 10
◦ all licenses
◦ any other files that are important to your operations
10. Close the WM Administrator Tool.
11. Upgrade the OS (or install the new OS).
12. Copy the license files from the repository onto the device on which you installed the new OS.
13. According to the procedure in the quick start guide that supports a fresh installation of the
new release, install all three components: the new WM release, MySQL database server, and
License Manager.
important ........... Do not start the WM service yet.
99
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
13.3 WM Downgrade
note ............. In case you elect to restore your system to a backed up copy in connection with the
downgrade, be aware that network element performance data that was collected between
the time of a backup and the time of its restore is present after the restore.
No downgrade path exists to retreat from the current release to any earlier release. To do this, you
must uninstall the current release and then re-install the earlier release. The installation tool for the
current release placed its uninstallation tool at
C:\Cambium\WM\Uninstall\Uninstaller.exe in Windows.
/usr/local/cambium/wm/Uninstall/Uninstaller.bin in Linux.
note ............. After the uninstallation tool finishes, you may or may not encounter the following error
message in a pop-up window: Unknown or newerVersion Installation
Detected. An instruction to remove the /etc/init.d/wmserver file may be
included in this window, regardless of whether the OS is Windows or Linux. This error may
be thrown under a variety of circumstances such as low resources, competing processes,
or an interruption of uninstallation tool processes. Typically though, regardless of what
circumstance triggers the error, the result that triggers the error is corruption of the
InstallAnywhere Registry file. Continue through this section to resolve the error.
If you ran the Uninstaller script to remove WM and to remove License Manager at the same time,
then you must remove from the registry file the feature tags for product names
...Wireless Manager... , ...License Manager, and for component name LinLIC or
WinLIC. This is essential for any subsequent installation that checks for the presence of License
Manager to succeed. Examples of the contents from a registry file follow.
100
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
101
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
</product>
- <product name="WM License Manager" id="925168a8-1ef3-11b2-b8b7-c06f25b923f3"
version="4.0.1.0" copyright="2004-2012" info_url="www.canopywireless.com"
support_url="www.canopywireless.com/support" location="C:\Cambium\LicenseManager"
last_modified="2012-02-16 20:49:29">
<vendor name="Cambium Networks" id="5678ffb6-1ee9-11b2-8d91-da59c1a72547"
home_page="www.cambiumnetworks.com" email="technical-support@canopywireless.com" />
- <feature short_name="LicMgr" name="License Manager" last_modified="2012-02-16 20:49:29">
- <![CDATA[
Install Prizm License Manager Server and License Manager Admin Web Server.
]]>
<component ref_id="6ed1feae-1eed-11b2-9b06-a704e97cb190" version="4.0.1.0"
location="C:\Cambium\LicenseManager\Uninstall\Uninstaller.exe" />
<component ref_id="6effe344-1ee8-11b2-b1bf-da59c1a72547" version="4.0.1.0"
location="C:\Cambium\LicenseManager\_jvm" />
<component ref_id="1a26b7de-1ef5-11b2-843b-c06f25b923f3" version="4.0.1.0"
location="C:\Documents and Settings\Administrator\Start Menu\Programs\Cambium
Networks\LicenseManager\License Files.lnk" />
</feature>
</product>
- <components>
<component id="1a26b7de-1ef5-11b2-843b-c06f25b923f3" version="4.0.1.0" name="WinLIC"
location="C:\Documents and Settings\Administrator\Start Menu\Programs\Cambium
Networks\LicenseManager\License Files.lnk" />
<component id="6effe344-1ee8-11b2-b1bf-da59c1a72547" version="4.0.1.0"
name="InstallAnywhere VM Component" location="C:\Cambium\LicenseManager\_jvm"
vendor="Cambium Networks" />
<component id="c4633bf4-1ee9-11b2-bbdf-da59c1a72547" version="1.0.0.0" name="AG-
Application, Install" location="C:\wmserver" />
<component id="d303eec7-1ee9-11b2-857a-da59c1a72547" version="1.0.0.0" name="AG-
Install, MySQL D" location="C:\Cambium\WM\mysql-enterprise-5.1.48-win32.msi" />
<component id="dad51170-1ef3-11b2-8422-c06f25b923f3" version="1.0.0.0" name="AG-
License" location="C:\Cambium\WM\license_manager.exe" />
<component id="c45ac565-1ee9-11b2-b9fb-da59c1a72547" version="1.0.0.0"
name="InstallAnywhere VM Component" location="C:\Cambium\WM\jre" />
<component id="d34cf756-1ee9-11b2-bf14-da59c1a72547" version="1.0.0.0" name="AG-
Install, MySQL D" location="C:\Cambium\WM\perl-DBI-1.40-8.i386.rpm" />
<component id="6140fa12-1eee-11b2-a328-c06f25b923f3" version="1.0.0.0" name="AG- JRE"
location="C:\Cambium\WM\jre-6u6-linux-i586.rpm" />
<component id="de73334a-1ef3-11b2-832f-c06f25b923f3" version="1.0.0.0" name="AG- MS-
VC++2005" location="C:\Cambium\WM\visual_c_plusplus_2005_sp1_redist_x86.exe" />
<component id="6ed1feae-1eed-11b2-9b06-a704e97cb190" version="4.0.1.0" name="AG-
PrizmEMS, LicMgr, Postgres" location="C:\Cambium\LicenseManager\Uninstall\Uninstaller.exe"
vendor="Cambium Networks" />
</components>
102
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
103
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
105
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
106
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
107
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
After you have reset the password but before you use the License Manager Administrator Tool web
site to configure and install license files, you must click the link for Licensing Configuration, then
change the password for the local server and click the Save Changes button. Then you can upload the
license to the local License Manager.
108
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
109
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
c. In the Licensing Configuration web page, select the Redundant Server check box.
d. Enter the license server IP, license server port, license web server user name, password,
and port.
important ........... Ensure that the IP addresses are in sequence of primary, secondary, and then tertiary
server and that the order is identical in every license file among the three servers.
Also ensure that all IP addresses are routable from each of the servers.
e. Click the Save Changes button.
13. Log on to the web server interface of the primary license server.
14. Click the Upload License File link.
15. Upload the license files.
16. Repeat Steps 6 and 7 on the secondary and tertiary servers.
17. All the licenses should be uploaded to the required license servers.
18. Check the directory C:\Cambium\LicenseManager\FLEXnet\license_files
in Windows or
/usr/local/cambium\LicenseManager\FLEXnet\license_files in Linux to
ensure that the file names are present.
note ............. Do not use simple file copying to place these files into the directory. Use the scripted
Upload License File selection.
19. Further check the licenses for their status as follows:
a. Log on to the web server interface of the primary license server.
b. Click the Licensing Status link.
110
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
c. Check that the status report shows the total number of licenses that you expect to see.
d. Log on to the web server interface of the secondary server.
e. Check the status report for consistency with that from the primary server.
f. Log on to the web server interface of the tertiary server.
g. Check the status report for consistency with those from the other two servers.
111
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
112
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
113
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
The System Backup option copies all information that is necessary to later return the system to the
current state. This includes the entire database and all essential files of the WM server file system.
important ........... Do not launch a backup while the WM server is running, because this can result in
inconsistency between the contents of the backup and the contents of the database.
note ............. Although the backup utility supports running while the WM service is up, it cannot keep
stride with changes made via the Web Start client while the script is running. Thus, it is
necessary to ensure that no Web Start client session is in progress at any time between
when this script is launched and when it is finished. If a client session is running during the
execution of the script, then a warning message informs the user of the backup operation
and advises that all current requests will be satisfied when the backup is complete.
The Restore System option replaces the current database and all essential files of the WM server file
system with the those that were last copied using the System Backup command option. However,
network element performance data that was collected between the time of backup and the time of
restore is present after the restore.
These operations cannot be performed in the client unless the client is local to the WM server. Other
client sessions that continue to run during the System Backup cause at least confusion about what
has been backed up, in that the results of its current and later operations are not recorded into the
backup. For this reason, WM throws an error into those client sessions, indicating that it will pause
until the remote backup (on the server device) has concluded.
The following are not supported restore scenarios, although they may succeed in certain cases:
Restore System of the backup data that was created on another machine.
Restore System on the same machine, but where the database backed up was of a different
MySQL version from the MySQL version that is on the target device.
114
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Although the remote clients have this panel in their version of the WM Administrator Tool, the panel
there does not include the System Backup block shown above.
The Server Actions block of this panel is also specific to whether the server is local:
In a client session on the local WM server
− Stop WM Server is active when the server is running. When this option is invoked,
WM proceeds to shut down without throwing a warning or a confirmation.
− Start WM Server is active when the server is not running.
− Restart WM Server is active when the server is running. When this option is invoked,
WM throws a pop-up message into client, saying that the connection has been lost and
prompting for whether to close the client or resume the session when the server comes
back up.
note ............. Start differs from restart as follows: Start commands start the service; in a two-step
automatic operation, Restart commands stop the running service and then restart it.
In a client session remote to the WM server, neither the Server Actions block nor any of the
command options described above are present.
The function invoked by the NE Re-Sync and NE Re-Sync after backup buttons is to remove the
events and alarms of all the managed elements as well as their traps that WM is currently processing,
and to refresh their status, but to allow their statistics to continue to be stored. If you select either of
these, WM throws a warning.
This amount of status polling consumes a significant amount of resources. Consider this advisory
carefully before you consider confirming by clicking the Yes button.
115
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
To make any changes from the defaults, click in the Value cell. This transforms the cell from read-only
data into a text box. Type in the substitute value. Then, to return the cell to read-only, click elsewhere
in the table (in the Attribute column or one of the column headings, for example).
BAM privileges are essential to its management functionalities, and each mapped privilege must be at
the System Administration (A) level.
116
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
To launch this panel from the main menu in the WM client, select
ToolsAdministrationServer Administration; in the left panel of the resulting WM Administrator
Tool dialog, select Database.
WM encrypts the database Password such that it is never readable in either the WM server file
system or the WM client. However, any change that you make in the Password field of this panel
must reflect the password that is configured in MySQL.
The Reset button returns all of the values to their defaults. Since these are all connection-related
attributes, the Reset operation does not return the original database schema as well. If you changed
the table structure or deliberately altered any other SQL settings and now need to revert to the
117
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
configuration that the WM installation tool had installed, perform the steps of Procedure 10: To
restore the installed WM database configuration.
The Test button launches a test of the connection between WM and the database, using the current
settings in this panel. When the values are properly set, the expected result of the connection test is
the following pop-up message:
note ............. Start differs from restart as follows: Start commands start the service; in a two-step
automatic operation, Restart commands stop the running service and then restart it.
118
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Changes that you save and licenses that you upload are reflected in the file
.../server/conf/licensing.xml. Restart LM is not necessitated by license uploads.
The Upload License option opens a browser to the local file system.
119
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
...
120
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
The NBI panel allows you to change the NBI passwords for SNMPv3-based security.
The Auth Password field is the SNMPv3 Authentication password.
The Priv Password field is the SNMPv3 Privacy password.
To use the V3 agent, you must provide both. The default passwords are authPassword and
privPassword, respectively.
The two SNMP settings blocks of this dialog are active only if they have context in the selected
SNMP Version.
121
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Figure 12: NBI panel of WM Administrator Tool, active SNMP V1/V2 settings
To make any change in the Trap Forwarding Configuration table, you must first check the
Enable Trap Forwarding check box. After this is done
to change an existing configuration, double-click the cell whose contents you want to change
and type the new content into the resulting text box there.
to remove an existing configuration, click the highlight the configuration you want to delete;
then click the Remove Trap Forwarding button.
to add a configuration, click the Add Trap Forwarding button; then for each column, double-
click in the blank cell and type the contents into the resulting text box.
To enforce all of the changes you have made in this dialog, click the Apply button. To dismiss the
dialog, click the OK button.
important ........... To ensure WM security, these passwords should be changed soon after installing
WM.
122
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
note ............. The following operations require both a click of the Apply button and a new client session
in order to be reflected in the client: Enable offline physical map, Add Layer, and
Delete Layer.
To set up WM to use the image layers that you have configured in GeoServer, perform the following
steps:
123
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
12. For any layer or layer group that is not yet seeded in GeoServer, optionally click the
Seed Layer button and configure the threads as described above.
13. To optionally launch the GeoServer home web page, click the Launch GeoServer button.
14. Click the Update button (not shown in Figure 13 above) to write the layer information to
an xml file in the WM server file system for use from the WM client application.
The system responds with the Information message
Successfully updated offline maps configuration. Please
restart your client for the changes to take effect.
To later make changes in the configuration of a layer, perform the following steps.
124
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
125
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
126
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
127
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
The image above depicts the primary window of the MIB Browser. The browser consists of the
following items:
Menu Bar: Displays a list of commands to perform various operations.
Tool Bar: Displays buttons with images that act as shortcuts to the menu options.
Left Frame: Holds the MIB tree. A MIB tree is a structure that displays all the loaded MIBs.
The MIB tree enables to traverse the tree, view the loaded MIBs, and the definition of each
node.
Right Frame: Contains text fields to specify the basic parameters, such as host, community,
and so on. It also contains a text area to display the results.
There are three ways in which the primary window of the MIB Browser can be displayed. They are the
Result Display, MIB Description, and Multi-Varbind. To change the display, select ViewDisplay and
select the desired view. By default, the MIB Description display is visible in the MIB Browser.
To configure the MIB Browser, click the MIB Browser Settings button or select Edit > Settings
from the menu. You can also use the shortcut key combination Alt + S.
The MIB Browser Settings dialog box will be displayed. The dialog has two tabs:
General
MIB Settings
128
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
The default community string is "public" and the default Write Community string is null. When Write
Community is null, community itself is used for SET operations. Therefore, applications should
explicitly set the Write Community, before they can use it for SET operations.
The other parameters are set in the General tab of the MIB Browser Settings frame. The general
settings include the basic protocol options related to SNMP, the display options, and a section for
encoding field. The image depicted below shows the General tab of the MIB Browser Settings dialog
box.
129
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
NOTES:
1. Timeout is the time interval that an application waits for a response message from
an agent before timing out. Retries is the number of times a request is sent when a
timeout occurs. If the Retries value is 0, the request is re-transmitted on Timeout.
2. Encoding, in general, means, modifying information into the required transmission
format. Computers around the world store information using a variety of encoding
schemes. The MIB Browser supports the ISO8859_1, which means the ISO 8859_1
and the Latin alphabet No.1. There are various other encoding schemes that
support various text formats. You can use the encoding scheme that best suits your
requirement while performing SNMP operations.
3. The Max Repetitions and Non Repeaters options are enabled only when the SNMP
version is set to either v2c or v3. This is because the GETBULK operation is available
only in v2c and v3. A GETBULK request is performed by giving an OID along with
two other parameters, Max Repetitions value and Non Repeaters value.
The Validate Broadcast Address check box enables you to check the validity of the broadcast address
provided. You need to provide the Net Mask address to validate the broadcast address. A Net Mask is
a string of 0's and 1's that hides the network part of the IP address and allows only the host ID to
remain.
In the V3 Options section, Context Name and the Context ID are to be provided as additional
parameters for an SNMPv3 request. An SNMP context name is a collection of management
information accessible by an SNMP entity. An item of management information may exist in more
than one context. An SNMP entity potentially has access to many contexts. In other words, if
management information has been defined under certain context by an SNMPv3 entity, any
management application can access that information by giving that context name. The Context ID
uniquely identifies an SNMP entity that may recognize an instance of a context with a particular
context name within an administrative domain.
Next is the V3 Settings section. The following are the security-related parameters for accessing the
SNMPv3 agents. You can add, modify, or delete users by clicking the Add, Modify, or Delete buttons.
130
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Authentication
any user defined value -
password
If the security level is "NoAuthNoPriv", no additional parameters are required. If the security level is
"AuthNoPriv", the parameters AuthProtocol and AuthPassword are set. If the user security level is
"AuthPriv", the privacy password needs to be set in addition to the other parameters.
The V3 Settings section has an option for storing the v3 table entries. The v3 table entries can be
stored in:
a serialized file
a database
131
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
To add an entry, enter the required parameters in the respective fields and click the Add Entry
button. Based on the parameters and the security level, Discovery and Time Synchronization are done
and USM Table is updated and listed in the v3 table.
To modify an entry, select the entry in the v3 table, modify the required fields, and click the Modify
button. Time Synchronization is done and the USM table is updated and listed in the v3 table.
note ............. The NoAuthNoPriv entry cannot be modified. Only the password fields in the AuthNoPriv
entry and AuthPriv entry can be modified.
To delete an entry in the v3 table, select the entry in the v3 table and click the Delete button. The
entry is removed from the USM table.
note ............. The settings are saved only on exiting the MIB Browser application and not every time the
settings are modified.
The 'Save v3 Settings to File' option is enabled only in the MIB Browser application and
not in the MIB Browser applet because of certain security restrictions in applets.
1. Click the Load MIB Module button or select FileLoad MIB from the menu.
Alternatively, you can use the shortcut combination Ctrl+O. This displays the Load a MIB File
dialog box.
2. In the Load a MIB File dialog box, select the MIB file from the
/usr/local/cambium/wm/server/mibs directory in Linux (or the
C:\Cambium\WM\server\mibs folder in Windows).
note ............. If MIB Browser is used as an applet, the URL should be relative to the Web server path. If
MIB Browser is used as an application, the specified URL can be absolute or relative.
When you use the MIB Browser applet, it is not possible to read a file on some host that is
not the applet's host because of the browser security. In the MIB Browser applet, remote
browsing of MIB file is supported through SAS.
3. There are other options for loading the MIB file. Click the Recent tab to load the recently
loaded MIB files.
4. Select the check box next to the MIB that is to be loaded and click Open to load the MIB file.
note ............. The Load All MIBs option in the File menu loads all the recently loaded MIBs.
The following sections provide a general overview of the various options available in the MIB Settings
section of the Load a MIB File dialog box.
132
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
133
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Selecting the option Load MIBs from Database enables the text fields in the JDBCParams section. On
initializing the necessary database parameters in this section, the database support can be provided
for loading MIBs. The required JDBCParams are:
Drivername - name of the database driver.
URL - URL pointing to the database filename.
UserName - name of the user.
Password - password for the user.
After selecting this loading option, select the required MIB file to be loaded from the Open tab of the
Load a MIB File dialog box. If the selected MIB file is already present in the database, the MIB file is
read, parsed, and loaded from the database. If the MIB file does not exist in the database, the MIB
Browser will parse the MIB file, write the output to the database, and then load the MIB file.
note ............. The recently loaded MIBs can be loaded automatically at startup by selecting the option
Load recently loaded Mibs at startup.
The loading of MIB files from the Oracle database has been tested. The following database
parameters are to be configured in the application.
driver name - org.jdbc.driver.OracleDriver
url - jdbc:oracle:thin:@<machine name>:1521:<database name>
username - a valid user name
password - password for the user
The Oracle driver has to be included in the CLASSPATH. If the jar is not present in the CLASSPATH, the
following exception is thrown:
Java.lang.ClassNotFoundException:oracle.jdbc.driver.OracleDriv
er
For other databases, use the equivalent parameters.
A few MIB files are provided in the mibs directory, i.e., RFC1213-MIB, RFC1271-RMON, RFC1155-SMI,
RMON2-MIB, TOKEN-RING-RMON-MIB, and RFC1315-FRAME. It may be convenient to copy your MIB
module files that are to be loaded into the "mibs" directory.
MIBs are always parsed before loading when the following operations are performed:
Loading MIBs directly
Loading MIB from Compiled File for the first time
Selecting the "Overwrite existing compiled MIB files" option
Loading MIB from database for the first time
134
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
The Load All MIBs option in the menu bar would load all the previously loaded MIBs and Unload All
MIBs would unload all the loaded MIBs in the MIB tree.
To get the information about the MIB Node in the MIB Tree, click the Description icon or choose
ViewDescription menu item or use a shortcut of Alt + R. This gives a list of all the vital
characteristics of the node such as the Node, OID, Path, MIB Module, Syntax, Status, etc.
135
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
If the MIB is not loaded in the MIB Browser, then the exact numbered OID with full
instance (for example 1.3.0 for sysUpTime) should be specified and the GET
operation should be performed.
If you want to communicate with a v3 agent, you have to select the v3 option in the MIB
Browser Settings dialog box and also make sure that the v3 parameters are set. Then
perform the above steps for each of the operations.
136
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Click the Get Next SNMP Variable button on the toolbar or select OperationsGetNext from
the menu bar. Alternatively, you can use the shortcut key combination Ctrl+N.
This operation will get the next object after the specified object, or the specific object instance, if a
MIB node is specified. The instance may or may not be specified. You can also perform a multi-
varbind GETNEXT request.
137
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
6. Click the Start button at the bottom of the SNMP Table panel.
The retrieval of data begins and the columnar objects are obtained and displayed in the
table.
138
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
139
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
◦ Split Columns - When the size of the PDU exceeds the limit, the agent sends the error
message "Too Big PDU Error". This field serves as an option for splitting the PDU. By
default, the PDU is split into half. If the number of varbinds is set by the user, then
multiple request with PDU containing number of varbinds set is sent.
◦ No of Columns/Request - This field is enabled on selecting the Split Columns check box.
You can specify the number for splitting of columns.
◦ Port - This field specifies the port to which the request is made.
◦ Table - The table OID is specified here.
◦ Max-Repetitions - This value specifies the number of lexicographic successors to be
returned for the remaining variables in the variable-bindings list. The default value is 5.
This is enabled only when the Retrieval Mode option is set to GetBulk.
◦ SnmpVersion - This gives the option to switch to any of the three versions of SNMP-v1,
v2c, and v3.
◦ Graph Type - This gives the option to switch between Line Graph and Bar Graph.
◦ Retrieval Mode - By default, GETNEXT is enabled. The GETBULK option is enabled only
on selecting v2c or v3.
12. If you need to view the graph, click the button.
13. Optionally, add rows.
14. Optionally, delete rows.
In a table, if one of the index columns is an external index (if the index value is shared by
some other table), then the table is called augmented, and a dependency exists between
rows of two tables. This situation might arise when a particular MIB imports another MIB
and shares a single table. For example, ifXTable defined in IF-MIB is an augmented table,
which has an external index ifIndex augmented from ifTable.
15. To see the columns of the table that augments the index from the original table, click the
Augmented Table button.
16. Click the Index Editor button to edit the index and view the rows from corresponding index.
17. To make changes to a particular column's values, right-click the column.
The various options available are:
◦ view column node details - This option gives the MIB Node Information of the selected
column.
◦ edit the header name for selected column - This invokes a dialog box in which you can
change the header for the selected column.
◦ view graph for selected cell(s) - This option invokes the graph. It is possible to view the
graphical representation for more than one cell by multiple selection of desired cells.
◦ add a new row to the table - This option is the same as the Add option available in the
Table panel.
◦ delete the selected rows from - This option is the same as the Delete option available in
the Table panel.
◦ view the not-accessible index - A request cannot be sent to an index that is not
accessible. In the table, the not-accessible index is not visible. Selecting this option
would enable you to view the not-accessible index values.
140
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Table OID should be specified Snmptable started without specifying any Table OID
Error Loading MIB: xyz Invalid file is loaded in the LoadMibDialog TextField
java.io.FileNotFoundException: for loading MIBs File.
Could not Open stream for But in the description TextField of MIB Browser, the
home/../AdventNet/SNMPv3/mibs/xyz.parser message thrown is "Loading Mibs: xyz"
RequestFailed: Error: Request TimedOut To LocalHost If the agent queried is not present in the network.
If the port number set is not valid for the agent
queried.
If the Community and Write Community specified
are not correct.
If the OID queried does not contain any data.
If for v3 agents security parameters are not set.
141
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Error sending set request: com.adventnet.snmp.beans: If setting value for a columnnode of a table does not
DataException: Error: Creating Variable have rowstatus.
LineGraphBean Error: cannot plot these values While plotting Line/Bar Graph,
.1.3..6.1.2.1..........................: value if the selected OID/LeafNode has syntax
................................................: value PhysAddress, NetworkAddress, IP Address, OBJECT
................................................: value IDENTIFIER.
ErrorSendingPDU: Failed to Authenticate the Security The exception is thrown while creating SnmpTable,
Parameters, for user SnmpEngineEntry not found for If the host name specified, is of different version
address( hostname) port(portNo.) than v3 which is set in settings table.
142
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Please enter the UserName If the Username is not set for the v3 User.
143
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Error in get request from < hostname >: 161 get Request for a v3 User(Database mode)
Failed to authenticate the security parameters for user AuthProtocol: SHA
privuser authKey length has to be 20. Context Name, ContextEngineID are not specified.
144
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
(java.net.UnknownHostException)
145
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
16.4 FAQs
How do I give Hex strings for SET values in MIB Browser?
The SnmpString class accepts Hex strings in a certain format. Any string that starts and ends with a
single quote(') is interpreted as an Hex string. The individual bytes should be separated using a
colon(:). For example, if you need to enter 0x2a304cab, it should be supplied as '2a:30:4c:ab'.
If I load the MIB Browser applet, I get the error "Error Sending PDUSecurity
Exception connecting to remote host" in the browser. Why is this so?
Applets are not allowed to talk to any host apart from the Web server from which they were
downloaded. Make sure that SAS is also running along with the Web server.
146
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
I do not get the "NO HOST Specified" error. What should I do?
Before making any request, the host name or the IP address of the machine in which the agent is
running should be specified in the "Host" text field of MIB Browser.
When I ask for 10 rows in an SNMP table, the GETBULK returns only 6 rows and
the last attribute of the sixth row is null. The sixth row seems to be truncated.
What should I do?
The number of rows you get back may be limited by the PDU size permitted by your agent, manager,
or transport.
I use JDK 1.2. How do I invoke MIB Browser as an applet through applet viewer?
From JDK1.1, the appletviewer no longer takes the CLASSPATH setting into consideration. Therefore
for the applets, the following command is to be given.
appletviewer -J-Xbootclasspath:.;
..\..\jars\AdventNetSnmp.jar;..\..\jars\AdventNetLogging.jar;
..\..\sasapps.jar; c:\jdk1.2\jre\lib\rt.jar
To load from the browsers, the HTML file should also be changed accordingly.
Applets could instead be packaged into jar files for easy use. Also, with JDK1.2, you can specify
dependencies on other jars through extensions. Therefore, if you create an applet that uses
AdventNet Beans and the target platform is the JDK1.2-plug-in, you need to include the CLASSPATH.
147
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
CAMBIUM NETWORKS, LTD (“Cambium”) is willing to license its Wireless Manager™ software and the
accompanying documentation (collectively, the “Software,” as further defined below) to you only on the condition
that you accept all the terms in this End User License Agreement (this “Agreement”).
IMPORTANT: READ THE FOLLOWING TERMS AND CONDITIONS BEFORE USING THE SOFTWARE AND ANY
EQUIPMENT AND/OR PRODUCTS THAT ACCOMPANY THE SOFTWARE.
BY CLICKING ON THE “ACCEPT” BUTTON DURING INSTALLATION, YOU ACKNOWLEDGE THAT YOU HAVE READ
THIS AGREEMENT, UNDERSTAND IT AND AGREE TO BE BOUND BY THE TERMS OF THIS AGREEMENT.
IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, CAMBIUM IS NOT WILLING TO LICENSE THE
SOFTWARE TO YOU AND YOU SHOULD CLICK ON THE “DO NOT ACCEPT” BUTTON TO DISCONTINUE THE
INSTALLATION PROCESS. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, YOU MAY, FOR A FULL
REFUND: (I) RETURN THE SOFTWARE TO THE ENTITY FROM WHOM YOU PURCHASED IT; OR, (II) FOR
DOWNLOADED SOFTWARE, PROVIDE TO THE ENTITY FROM WHOM YOU PURCHASED THE SOFTWARE YOUR
WRITTEN VERIFICATION OF DELETION OF ALL COPIES OF THE SOFTWARE.
1. Definitions. In this Agreement, the word “Software” refers to the set of instructions for computing devices, in
executable form and in any media (which may include diskette(s), CD-ROM(s), downloadable Internet file(s),
hardware, firmware, etc.), and includes without limitation interfaces, content, fonts, images, photographs,
animations, video, audio, music text, “applets” and included data, as well as the accompanying documentation,
such as manuals and instructional aids, whether in printed or electronic form, for the software product identified
above.
2. General. The Software is licensed, and not sold, to you by Cambium for use only under the terms of this
Agreement. Cambium and/or Cambium’s licensor(s) retain all right, title and interest in and to the Software, and
the copyrights and other intellectual property rights therein and thereto, and reserve all rights not expressly
granted to you in this Agreement. The terms of this Agreement will govern any update(s) and/or upgrade(s) to the
Software provided by Cambium that replace and/or supplement the original Software, unless such update(s)
and/or upgrade(s) are accompanied by a separate license in which case the terms of that license will govern.
3. Grant of License. Cambium grants you (“Licensee” or “you”) a limited, personal, nonexclusive and non-
transferable (except as otherwise provided herein) license to use the Software subject to the Conditions of Use set
forth in Section 4 and the remaining terms and conditions of this Agreement. Any terms or conditions appearing on
the face or reverse side of any purchase order, purchase order acknowledgment or other order document that are
different from, or in addition to, the terms of this Agreement will not be binding on the parties, even if payment is
accepted.
4. Conditions of Use; Restrictions on Use. The Software is protected by international intellectual property laws and
treaties, and other applicable laws. Any use of the Software in violation of the terms and conditions set forth in
this Agreement is strictly prohibited and will be deemed a breach of this Agreement. In addition to the other terms
and conditions of this Agreement, you agree to the following specific conditions and restrictions:
4.1. You will use the Software in compliance with all applicable laws, including local laws of the country or
region in which you reside or in which you use the Software.
4.2. Only you, your employees or agents may use the Software. You will take all necessary steps to insure
that your employees and agents abide by the terms of this Agreement.
4.3. You will use the Software: (i) only for your internal business purposes; (ii) only as described in the
Software; and, (iii) in strict accordance with this Agreement.
149
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
4.4. You will install and use the Software on a single computing device.
4.5. To the extent the Software includes features involving maps, you will take all reasonable efforts not
exceed 20,000 map page views per year. Cambium reserves the right to disable the usage of features
involving maps if your annual usage of map page views exceeds 20,000 map page views.4.6. You will
not, and you will not enable others to, copy (except for back-up purposes as expressly permitted by
this Agreement), decompile, bootleg, reverse engineer, disassemble, attempt to derive the source
code of, decrypt, modify, translate, or create derivative works from the Software, or any part thereof
(except as, and only to the extent, any foregoing restriction is prohibited by applicable law). Any
attempt to do so is a violation of the rights of Cambium and/or its licensor(s) in the Software.
4.7. You will not attempt to defeat any copy protection device included with the Software.
4.8. If the Software is provided on multiple types of media, you will use only the media that best meets
your specific needs, and you will not loan, rent, lease or transfer the other media contained in the
package without Cambium’s written consent.
4.9. You will not remove any proprietary notices, marks, labels, or logos from the Software.
4.10 Unless otherwise provided herein, you will not rent, lease, sublicense or transfer the Software, or any
part thereof, to any other party without Cambium’s prior written consent.
4.11. You will not use the Software for any purposes prohibited by applicable law, including without
limitation the development, design, manufacture or production of nuclear, missiles, or chemical or
biological weapons.
USE OF THE SOFTWARE IN ANY MANNER OTHER THAN AS PROVIDED HEREIN IS STRICTLY PROHIBITED
AND MAY INFRINGE ON THE INTELLECTUAL PROPERTY RIGHTS OF CAMBIUM AND/OR ITS LICENSOR(S),
SUBJECTING YOU TO CIVIL AND CRIMINAL PENALTIES, INCLUDING WITHOUT LIMITATION MONETARY
DAMAGES AND IMPRISONMENT FOR COPYRIGHT INFRINGEMENT.
5. Back-Ups. Notwithstanding anything to the contrary in this Agreement, you may make one (1) copy of the
Software in machine-readable form for back-up purposes only. If the documentation for the Software is in printed
form, it may not be copied. With regard to all copies of the Software permitted herein, you agree to reproduce on
such copies all Cambium copyright notices, and other proprietary notices appearing on and in the original
Software.
6. Export. You may not export, re-export or transfer, directly or indirectly, the Software except as authorized by
United States law or by the laws of the jurisdiction(s) in which the Software was obtained. By way of example, but
without limitation of the foregoing, if your Software was obtained in the United States, the Software may not be
exported, re-exported or transferred: (a) into any U.S. embargoed countries; or, (b) to anyone on the U.S. Treasury
Department's list of Specially Designated Nationals or the U.S. Department of Commerce Denied Person’s List or
Entity List. By using the Software, you represent and warrant that you are not located in any such country or on
any such list.
7. Confidentiality. You acknowledge that the Software contains valuable proprietary information and trade secrets
and that unauthorized or improper use of the Software will result in irreparable harm to Cambium for which
monetary damages would be inadequate and for which Cambium will be entitled to immediate injunctive relief.
Accordingly, you will limit access to the Software to those of your employees and agents who need to use the
Software for your internal business purposes, and you will take appropriate action with those employees and
agents to preserve the confidentiality of the Software, using the same degree of care to avoid unauthorized or
improper disclosure as you use for the protection of your own proprietary software, but in no event less than
reasonable care. You have no obligation to preserve the confidentiality of any information that: (i) was in the
public domain at the time of disclosure; (ii) entered the public domain through no fault of yours; (iii) was given to
you free of any obligation to keep it confidential; (iv) is independently developed by you; or, (v) is disclosed as
required by law provided that you notify Cambium prior to such disclosure and provide Cambium with a
reasonable opportunity to respond.
150
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
8. Right to Use Cambium’s Name. Except as required in Section 5 above, you will not, during the term of this
Agreement or thereafter, use any trademark of Cambium, or any word and/or symbol likely to be confused with
any Cambium trademark, either alone or in any combination with other words and/or symbols.
9. Transfer. In the case of Software designed to operate on Cambium equipment, you may not transfer the
Software to another party except: (i) if you are an end-user, when you are transferring the Software together with
the Cambium equipment on which it operates; or, (ii) if you are a Cambium authorized distributor, when you are
transferring the Software either together with such Cambium equipment or are transferring the Software as a
licensed duly paid-for upgrade, update, patch, new release, enhancement or replacement of a prior version of the
Software. If you are a Cambium authorized distributor, when you are transferring the Software as permitted in this
Agreement, you agree to transfer the Software with a license agreement having terms and conditions no less
restrictive than those contained in this Agreement. All transfers of the Software under this Section 9 are strictly
subject to the conditions precedent that: (iii) the other party agrees to accept the terms and conditions of this
Agreement; and, (ii) you destroy any copy of the Software you do not transfer to that party. Unless otherwise
provided herein, the Software may not be transferred, and this Agreement may not be assigned, by you without
Cambium’s prior written consent.
10. Upgrades and Updates. If the Software is licensed to you as an upgrade or update to software previously
licensed to you, you must destroy the software previously licensed to you, including any copies, within 30 days of
your receipt of the Software.
11. Maintenance and Support. Cambium is not responsible for maintenance or support of the Software, or the
equipment on which the Software resides or is used, under this Agreement. By accepting the license granted under
this Agreement, you agree that Cambium will be under no obligation to provide any support, maintenance or
service in connection with the Software or such equipment. Maintenance and support of the Software and/or such
equipment by Cambium may be available under the terms of a separate agreement.
12. Limited Warranty. All physical media, such as diskettes or CD-ROMS, on which the Software is furnished by
Cambium (the “Media”) are warranted to be free from manufacturing and material defects for ninety (90) days
after the shipment date of the Media to you. Media that becomes defective during such period will be repaired or,
at Cambium’s option, replaced. This limited warranty is contingent upon proper use of the Media and does not
cover Media that has been tampered with, modified or subjected to unusual physical or electrical stress.
Tampering with or removing any factory seal or label on any Media voids this warranty and releases Cambium
from any and all liability. The entire liability of Cambium, and your exclusive remedy under the warranty provided
in this Section 12 will be, at Cambium’s option, to repair or replace any Media found to be defective within the
warranty period, or to refund the purchase price and terminate this Agreement. To seek such a remedy, you must
return the Software to Cambium, with a copy of the original purchase receipt, within the warranty period.
13. Disclaimer. EXCEPT FOR THE ABOVE EXPRESS LIMITED WARRANTY FOR THE MEDIA, AND TO THE MAXIMUM
EXTENT PERMITTED BY APPLICABLE LAW, THE SOFTWARE IS PROVIDED "AS IS" AND “AS AVAILABLE”, WITHOUT
WARRANTY OF ANY KIND, AND CAMBIUM ON BEHALF OF ITSELF AND ITS LICENSOR(S) HEREBY DISCLAIMS ALL
WARRANTIES AND CONDITIONS WITH RESPECT TO THE SOFTWARE, EXPRESS, IMPLIED OR STATUTORY, INCLUDING
WITHOUT LIMITATION THE IMPLIED WARRANTIES AND/OR CONDITIONS OF MERCHANTABILITY, OF SATISFACTORY
QUALITY, OF FITNESS FOR A PARTICULAR PURPOSE, OF ACCURACY, OF QUIET ENJOYMENT, AND OF NON-
INFRINGEMENT OF THIRD PARTY RIGHTS. CAMBIUM ALSO DOES NOT WARRANT THAT THE FUNCTIONS
CONTAINED IN, PERFORMED AND/OR PROVIDED BY THE SOFTWARE WILL MEET YOUR REQUIREMENTS, THAT THE
OPERATION OF THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE, THAT THE SOFTWARE WILL BE
COMPATIBLE OR WORK WITH ANY THIRD PARTY SOFTWARE, APPLICATIONS OR DEVICES, OR THAT DEFECTS IN THE
SOFTWARE WILL BE CORRECTED. CAMBIUM MAKES NO WARRANTY WITH RESPECT TO THE CORRECTNESS,
ACCURACY, OR RELIABILITY OF THE SOFTWARE, AND YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT, TO THE
EXTENT PERMITTED BY APPLICABLE LAW, YOUR USE OF THE SOFTWARE IS AT YOUR SOLE RISK AND THAT THE
ENTIRE RISK AS TO SATISFACTORY QUALITY, PERFORMANCE, ACCURACY AND EFFORT IS WITH YOU. YOU FURTHER
ACKNOWLEDGE AND AGREE THAT THE SOFTWARE IS NOT INTENDED OR SUITABLE FOR USE IN SITUATIONS OR
ENVIRONMENTS WHERE THE FAILURE OR TIME DELAYS OF, OR ERRORS OR INACCURACIES IN THE CONTENT, DATA
OR INFORMATION PROVIDED BY THE SOFTWARE COULD LEAD TO DEATH, PERSONAL INJURY, OR SEVERE PHYSICAL
151
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
152
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Party Software UNLESS A SEPARATE THIRD-PARTY SOFTWARE LICENSE IS INCLUDED, IN WHICH CASE YOUR USE OF
THE THIRD-PARTY SOFTWARE WILL THEN BE GOVERNED BY THE SEPARATE THIRD-PARTY LICENSE. Use of the
Google Maps service is subject to the following additional terms: Google Maps Terms of Service available at
http://maps.google.com/help/terms_maps.html and Google Maps Legal Notices at
http://maps.google.com/help/legalnotices_maps.html. By using the Software you are agreeing be bound by the
terms of use for all Third-Party Software. If the Software licensed under this Agreement contains publicly available
(open source) Third-Party Software, the terms and conditions governing the use of such publicly available Third-
Party Software are in the software licenses of the copyright owner(s) of such software and not this Agreement. If
there is a conflict between the terms and conditions of this Agreement and the terms and conditions of the
publicly available Third-Party Software license(s) governing your use of the publicly available Third-Party Software,
the terms and conditions of the license of the applicable publicly available Third-Party Software license(s) will take
precedence over the license granted in this Agreement. The license agreements for publicly available Third-Party
Software included by Cambium are available in the file Cambium Publicly Available Software Legal Notices.htm
installed in the server file system during installation of the Software. The software license agreements for publicly
available Third-Party Software included by third parties are available in the file Third Party Publicly Available
Software Legal Notices.htm installed in the server file system during installation of the Software.
21. Privacy. Your use of the Software is subject to Cambium’s Privacy Policy available at:
http://cambiumnetworks.com/legal/terms_of_use.php as well as the Google Maps privacy policy described at
http://www.google.com/privacy.html, the terms of which are incorporated herein by reference.
IF THE FOREGOING TERMS AND CONDITIONS ARE ACCEPTABLE TO YOU, PLEASE INDICATE YOUR AGREEMENT
AND ACCEPTANCE BY CLICKING ON THE BUTTON LABELED “ACCEPT.” IF THE FOREGOING TERMS AND
CONDITIONS ARE NOT ACCEPTABLE TO YOU, PLEASE CLICK ON THE “DO NOT ACCEPT” BUTTON.
WIRELESS MANAGER™, CAMBIUM™, CAMBIUM NETWORKS™, and the Cambium Networks Logo are trademarks of
Cambium Networks, Ltd.
© Copyright 2015 Cambium Networks, Ltd All rights reserved.
153
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
CAMBIUM PUBLICLY AVAILABLE SOFTWARE LEGAL NOTICES AND END USER LICENSE
AGREEMENTS FOR PUBLICLY AVAILABLE SOFTWARE
The Wireless Manager™ software may include Cambium software, commercial third party software, and/or
publicly available (open source) software.
The Cambium software included in the Wireless Manager™ software is copyright (c) by Cambium Networks, LTD
(“Cambium”), and its use is subject to the licenses, terms and conditions of the agreement in force between the
purchaser of the Wireless Manager™ software and Cambium. The commercial third party software that may be
included in or with the Wireless Manager™ software is subject to the licenses, terms and conditions of the
agreement in force between you and Cambium, unless a separate commercial third party software license is
included, in which case, your use of the commercial third party software will then be governed by the separate
commercial third party license. The publicly available software that may be included in or with the Wireless
Manager™ software is listed below. The use of the listed publicly available software is subject to the licenses,
terms and conditions of the agreement in force between you and Cambium, as well as the terms and conditions of
the license of each publicly available software package. Copies of the licenses for the listed publicly available
software, as well as, all attributions, acknowledgements, and software information details, are included below.
Cambium is required to reproduce the software licenses, acknowledgments and copyright notices as provided by
the authors and owners, thus, all such information is provided in its native language form, without modification or
translation.
The publicly available software in the list below includes the publicly available software included by Cambium. The
publicly available software included by commercial third party software that is used in the Wireless Manager™
software is disclosed in the Third Party Publicly Available Software Legal Notices accompanying the Wireless
Manager™ software.
For instructions on how to obtain a copy of any source code being made publicly available by Cambium related to
software used in the Wireless Manager™ software you may send your request in writing to:
Cambium Networks, LTD
Attention: Open Source Software Manager
1299 E. Algonquin Road
Schaumburg, IL 60196
In your request, please include the version of the Wireless Manager™ software, along with the publicly available
software specifics, such as the publicly available software name and version.
Note: the source code for the publicly available software may be resident on the Cambium product installation
media, or on supplemental Cambium product media and/or Cambium websites. Please reference and review these
entire Cambium Publicly Available Software Legal Notices and End User License Agreements for Publicly Available
Software for the details on location and methods of obtaining the source code.
Note: dependent on the license terms of the publicly available software, source code may not be provided. Please
reference and review these entire Cambium Publicly Available Software Legal Notices and End User License
Agreements for Publicly Available Software for the details on location and methods of obtaining the source code.
To view additional information regarding licenses, acknowledgments and required copyright notices for publicly
available software used in the Wireless Manager™ software, please select “Legal Notices” display from the GUI (if
applicable), or review the legal notices and end user license agreements in the README files or other files created
during installation, in the documentation, on the installation media, or resident in the Wireless Manager™
software.
WIRELESS MANAGER™, CAMBIUM™, CAMBIUM NETWORKS™, and the Cambium Networks Logo are trademarks of
Cambium Networks, LTD. All other trademarks, logos, and service marks are the property of the respective third
party owners. You are not permitted to use any marks without the prior written consent of Cambium or such third
party which may own the marks.
154
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
The following are the end user license agreements for publicly available software that Cambium has included.
Ant Contrib
Version: 1.0b3
Description: The Ant-Contrib project is a collection of tasks (and at one point maybe types and other tools) for
Apache Ant. Used to facilitate automation of build scripts.
Software site: http://sourceforge.net/projects/ant-contrib
Source Code: The source packages for Ant Contrib 1.0b3 are available from the original software site, or may be
acquired from Cambium. To obtain the software from Cambium, please contact Cambium using the methods
described in the preamble of this document.
License: The Apache Software License, Version 1.1
Copyright (c) 2001-2003 Ant-Contrib project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. The end-user documentation included with the redistribution, if any, must include the following
acknowledgment:
"This product includes software developed by the Ant-Contrib project
(http://sourceforge.net/projects/ant-contrib)."
Alternately, this acknowledgment may appear in the software itself, if and wherever such third-party
acknowledgments normally appear.
4. The name Ant-Contrib must not be used to endorse or promote products derived from this software without
prior written permission. For written permission, please contact http://sourceforge.net/.
5. Products derived from this software may not be called "Ant-Contrib" nor may "Ant-Contrib" appear in their
names without prior written permission of the Ant-Contrib project.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE ANT-CONTRIB PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Geo API
Version: 2.1
Description: Java library for Geo spatial data manipulation
Software site: http://geoapi.sourceforge.net/
Source Code: The source packages for Geo API are available from the original software site, or may be acquired
from Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in
the preamble of this document.
License: OGC (Open Geospatial Consortium)
155
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
This OGC work (including software, documents, or other related items) is being provided by the copyright holders
under the following license. By obtaining, using, and/or copying this work, you (the licensee) agree that you have
read, understood, and will comply with the following terms and conditions: Permission to use, copy, and modify
this software and its documentation, with or without modification, for any purpose and without fee or royalty is
hereby granted, provided that you include the following on ALL copies of the software and documentation or
portions thereof, including modifications, that you make:
1. The full text of this NOTICE in a location viewable to users of the redistributed or derivative work.
2. Any pre-existing intellectual property disclaimers, notices, or terms and conditions. If none exist, a short notice
of the following form (hypertext is preferred, text is permitted) should be used within the body of any
redistributed or derivative code: "Copyright © [$date-of-document] Open Geospatial Consortium, Inc. All Rights
Reserved. http://www.opengeospatial.org/Legal/ (Hypertext is preferred, but a textual representation is
permitted.)
3. Notice of any changes or modifications to the OGC files, including the date changes were made. (We
recommend you provide URLs to the location from which the code is derived.)
THIS SOFTWARE AND DOCUMENTATION IS PROVIDED "AS IS," AND COPYRIGHT HOLDERS MAKENO
REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITEDTO, WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THATTHE USE OF THE SOFTWARE OR
DOCUMENTATION WILL NOT INFRINGE ANY THIRD PARTYPATENTS, COPYRIGHTS, TRADEMARKS OR OTHER
RIGHTS. COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL ORCONSEQUENTIAL
DAMAGES ARISING OUT OF ANY USE OF THE SOFTWARE OR DOCUMENTATION.
The name and trademarks of copyright holders may NOT be used in advertising or publicity pertaining to the
software without specific, written prior permission. Title to copyright in this software and any associated
documentation will at all times remain with copyright holders.
Javolution
Version: 5.2.5
Description: Java library for Geo spatial data manipulation
Software site: http://javolution.org/
Source Code: The source packages for Javolution are available from the original software site, or may be acquired
from Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in
the preamble of this document.
License: Javolution - Java(tm) Solution for Real-Time and Embedded Systems
Copyright (c) 2005 - 2007 Javolution (http://javolution.org/). All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
156
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
JScience
Version: 4.3.1
Description: Java library for Geo spatial data manipulation
Software site: http://jscience.org
Source Code: The source packages for JScience are available from the original software site, or may be acquired
from Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in
the preamble of this document.
License: JScience - Java(TM) Tools and Libraries for the Advancement of Sciences
Copyright (C) 2006 - JScience (http://jscience.org/). All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
* Redistributions of source code must retain the above copyright notice and include this license agreement.
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" ANDANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ONANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
XStream
Version: 4.2.6
Description: Java, JSON and XML serialization library
Software site: http://xstream.codehaus.org/
Source Code: The source packages for XStream are available from the original software site, or may be acquired
from Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in
the preamble of this document.
License: XStream is open source software, made available under a BSD license.
Copyright (c) 2003-2006, Joe Walnes
Copyright (c) 2006-2007, XStream Committers
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met: Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation and/or other materials provided with the
distribution. Neither the name of XStream nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH.
157
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
NetCDF
Version: 2.2.22
Description: Used to calculate latitude/longitude points
Software site: http://www.unidata.ucar.edu/software/netcdf-java/
Source Code: The source packages for NetCDF are available from the original software site, or may be acquired
from Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in
the preamble of this document.
License: Copyright 1993-2008 University Corporation for Atmospheric Research/Unidata
Portions of this software were developed by the Unidata Program at the University Corporation for Atmospheric
Research. Access and use of this software shall impose the following obligations and understandings on the user.
The user is granted the right, without any fee or cost, to use, copy, modify, alter, enhance and distribute this
software, and any derivative works thereof, and its supporting documentation for any purpose whatsoever,
provided that this entire notice appears in all copies of the software, derivative works and supporting
documentation. Further, UCAR requests that the user credit UCAR/Unidata in any publications that result from the
use of this software or in any product that includes this software, although this is not an obligation. The names
UCAR and/or Unidata, however, may not be used in any advertising or publicity to endorse or promote any
products or commercial entity unless specific written permission is obtained from UCAR/Unidata. The user also
understands that UCAR/Unidata is not obligated to provide the user with any support, consulting, training or
assistance of any kind with regard to the use, operation and performance of this software nor to provide the user
with any updates, revisions, new versions or "bug fixes."
THIS SOFTWARE IS PROVIDED BY UCAR/UNIDATA "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL UCAR/UNIDATA BE LIABLE FOR ANY SPECIAL,
INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA
OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE ACCESS, USE OR PERFORMANCE OF THIS SOFTWARE.
Yahoo Yui widgets
Version: 2.5.2
Description: Javascript based client mapping log widget
Software site: http://developer.yahoo.com/yui/
Source Code: The source packages for Yahoo Yui Widgets are available from the original software site, or may be
acquired from Cambium. To obtain the software from Cambium, please contact Cambium using the methods
described in the preamble of this document.
License: Software License Agreement (BSD License)
Copyright (c) 2009, Yahoo! Inc. All rights reserved.
Redistribution and use of this software in source and binary forms, with or without modification, are permitted
provided that the following conditions are met: Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above
copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution. Neither the name of Yahoo! Inc. nor the names of its contributors may be used to
endorse or promote products derived from this software without specific prior written permission of Yahoo! Inc.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
158
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
dnsjava
Version: 2.0.6
Description: dnsjava is an implementation of DNS in Java. It supports all defined record types (including the
DNSSEC types), and unknown types. It can be used for queries, zone transfers, and dynamic updates.
Software site: http://www.dnsjava.org/
Source Code: The source packages for dnsjava are available from the original software site, or may be acquired
from Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in
the preamble of this document.
License: dnsjava is placed under the BSD license. Several files are also under additional licenses; see the individual
files for details.
Copyright (c) 1999-2005, Brian Wellington. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met: Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation and/or other materials provided with the
distribution. Neither the name of the dnsjava project nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Final notes:
- Thanks to Network Associates, Inc. for sponsoring some of the original dnsjava work in 1999-2000.
- Thanks to Nominum, Inc. for sponsoring some work on dnsjava from 2000 to the present.
The following six packages use the Apache License, Version 2.0, January 2004, whose full text is provided under
Apache License Version 2.0, January 2004.
Axis.jar
Version: 1.4
Description: Used to access Prizm APIs exposed through Web Services from WM
Software site: http://ws.apache.org/axis/
Source Code: The source packages for Axis are available from the original software site, or may be acquired from
Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in the
preamble of this document.
JAX RPC 1.1
Version: 1.1
Description: Used to access Prizm APIs exposed through Web Services from WM
Software site: http://ws.apache.org/axis/
159
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Source Code: The source packages for JAX RPC 1.1 are available from the original software site, or may be
acquired from Cambium. To obtain the software from Cambium, please contact Cambium using the methods
described in the preamble of this document.
log4j-1.2.12.jar
Version: 1.2.12
Description: Used to access Prizm APIs exposed through Web Services from WM
Software site: http://sourceforge.net/projects/log4j
Source Code: The source packages for log4j-1.5.12.jar are available from the original software site, or may be
acquired from Cambium. To obtain the software from Cambium, please contact Cambium using the methods
described in the preamble of this document.
wsdl4j-1.5.1.jar
Version: 1.5.1
Description: Used to access Prizm APIs exposed through Web Services from WM
Software site: http://sourceforge.net/projects/wsdl4j
Source Code: The source packages for wsdl4j-1.5.1.jar are available from the original software site, or may be
acquired from Cambium. To obtain the software from Cambium, please contact Cambium using the methods
described in the preamble of this document.
commons-logging-1.0.4.jar
Version: 1.0.4
Description: Used to access Prizm APIs exposed through Web Services from WM
Software site: http://commons.apache.org/logging/
Source Code: The source packages for commons-logging-1.0.4.jar are available from the original software site, or
may be acquired from Cambium. To obtain the software from Cambium, please contact Cambium using the
methods described in the preamble of this document.
commons-discovery-0.2.jar
Version: 0.2
Description: Used to access Prizm APIs exposed through Web Services from WM
Software site: http://commons.apache.org/discovery/
Source Code: The source packages for commons-discovery-0.2.jar are available from the original software site, or
may be acquired from Cambium. To obtain the software from Cambium, please contact Cambium using the
methods described in the preamble of this document.
Apache License
Version 2.0, January 2004
http://www.apache.org/licenses/
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by
Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the
copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other
entities that control, are controlled by, or are under common control with that entity. For the purposes of this
definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity,
whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii)
beneficial ownership of such entity. "You" (or "Your") shall mean an individual or Legal Entity exercising
permissions granted by this License. "Source" form shall mean the preferred form for making modifications,
including but not limited to software source code, documentation source, and configuration files. "Object" form
shall mean any form resulting from mechanical transformation or translation of a Source form, including but not
limited to compiled object code, generated documentation, and conversions to other media types. "Work" shall
160
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by
a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).
"Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the
Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole,
an original work of authorship. For the purposes of this License, Derivative Works shall not include works that
remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works
thereof. "Contribution" shall mean any work of authorship, including the original version of the Work and any
modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for
inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of
the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or
written communication sent to the Licensor or its representatives, including but not limited to communication on
electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf
of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is
conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution."
"Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been
received by Licensor and subsequently incorporated within the Work.
2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants
to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce,
prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such
Derivative Works in Source or Object form.
3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to
You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section)
patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such
license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their
Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was
submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit)
alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent
infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the
date such litigation is filed.
4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any
medium, with or without modifications, and in Source or Object form, provided that You meet the following
conditions:
(a) You must give any other recipients of the Work or Derivative Works a copy of this License; and
(b) You must cause any modified files to carry prominent notices stating that You changed the files; and
(c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent,
trademark, and attribution notices from the Source form of the Work, excluding those notices that do
not pertain to any part of the Derivative Works; and
(d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You
distribute must include a readable copy of the attribution notices contained within such NOTICE file,
excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the
following places: within a NOTICE text file distributed as part of the Derivative Works; within the
Source form or documentation, if provided along with the Derivative Works; or, within a display
generated by the Derivative Works, if and wherever such third-party notices normally appear. The
contents of the NOTICE file are for informational purposes only and do not modify the License. You
may add Your own attribution notices within Derivative Works that You distribute, alongside or as an
addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot
be construed as modifying the License.
You may add Your own copyright statement to Your modifications and may provide additional or different license
terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works
161
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions
stated in this License.
5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for
inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any
additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of
any separate license agreement you may have executed with Licensor regarding such Contributions.
6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or
product names of the Licensor, except as required for reasonable and customary use in describing the origin of the
Work and reproducing the content of the NOTICE file.
7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work
(and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF
ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-
INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for
determining the appropriateness of using or redistributing the Work and assume any risks associated with Your
exercise of permissions under this License.
8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract,
or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in
writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or
consequential damages of any character arising as a result of this License or out of the use or inability to use the
Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction,
or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of
such damages.
9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You
may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations
and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own
behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify,
defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such
Contributor by reason of your accepting any such warranty or additional liability.
END OF TERMS AND CONDITIONS
APPENDIX: How to apply the Apache License to your work.
To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by
brackets "[]" replaced with your own identifying information. (Don't include the brackets!) The text should be
enclosed in the appropriate comment syntax for the file format. We also recommend that a file or class name and
description of purpose be included on the same "printed page" as the copyright notice for easier identification
within third-party archives. Copyright [yyyy] [name of copyright owner] Licensed under the Apache License,
Version 2.0 (the "License"); you may not use this file except in compliance with the License.
You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0.
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on
an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License
for the specific language governing permissions and limitations under the License.
162
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
THIRD PARTY PUBLICLY AVAILABLE SOFTWARE LEGAL NOTICES AND END USER LICENSE
AGREEMENTS FOR PUBLICLY AVAILABLE SOFTWARE
The Wireless Manager™ software may include Cambium software, commercial third party software, and/or
publicly available (open source) software.
The Cambium software included in the Wireless Manager™ software is copyright (c) by Cambium Networks, LTD
(“Cambium”), and its use is subject to the licenses, terms and conditions of the agreement in force between the
purchaser of the Wireless Manager™ software and Cambium. The commercial third party software that may be
included in or with the Wireless Manager™ software is subject to the licenses, terms and conditions of the
agreement in force between you and Cambium, unless a separate commercial third party software license is
included, in which case, your use of the commercial third party software will then be governed by the separate
commercial third party license. The publicly available software that may be included in or with the Wireless
Manager™ software is listed below. The use of the listed publicly available software is subject to the licenses,
terms and conditions of the agreement in force between you and Cambium, as well as the terms and conditions of
the license of each publicly available software package. Copies of the licenses for the listed publicly available
software, as well as, all attributions, acknowledgements, and software information details, are included below.
Cambium is required to reproduce the software licenses, acknowledgments and copyright notices as provided by
the authors and owners, thus, all such information is provided in its native language form, without modification or
translation.
The publicly available software in the list below includes the publicly available software included by commercial
third party software that is used in the Wireless Manager™ software. The publicly available software included by
Cambium that is used in the Wireless Manager™ software is disclosed in the Cambium Publicly Available Software
Legal Notices and End User License Agreements for Publicly Available Software accompanying the Wireless
Manager™ software.
For instructions on how to obtain a copy of any source code being made publicly available by Cambium related to
software used in the Wireless Manager™ software you may send your request in writing to:
Cambium Networks, LTD
Attention: Open Source Software Manager
1299 E. Algonquin Road
Schaumburg, IL 60196
In your request, please include the version of the Wireless Manager™ software, along with the publicly available
software specifics, such as the publicly available software name and version.
Note: the source code for the publicly available software may be resident on the Cambium product installation
media, or on supplemental Cambium product media and/or Cambium websites. Please reference and review these
entire Third Party Publicly Available Software Legal Notices and End User License Agreements for Publicly Available
Software for the details on location and methods of obtaining the source code.
Note: dependent on the license terms of the publicly available software, source code may not be provided. Please
reference and review these entire Third Party Publicly Available Software Legal Notices and End User License
Agreements for Publicly Available Software for the details on location and methods of obtaining the source code.
To view additional information regarding licenses, acknowledgments and required copyright notices for publicly
available software used in the Wireless Manager™ software, please select “Legal Notices” display from the GUI (if
applicable), or review the legal notices and end user license agreements in the README files or other files created
during installation, in the documentation, on the installation media, or resident in the Wireless Manager™
software.
WIRELESS MANAGER™, CAMBIUM™, CAMBIUM NETWORKS™, and the Cambium Networks Logo are trademarks of
Cambium Networks, LTD. All other trademarks, logos, and service marks are the property of the respective third
party owners. You are not permitted to use any marks without the prior written consent of Cambium or such third
party which may own the marks.
163
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
The following are the end user license agreements for publicly available software that commercial third party
software has included.
openorb_tools-1.2.0.jar
Version: 1.2
Description: CORBA
Software Site: http://sourceforge.net/project/showfiles.php?group_id=43608&package_id=36153
Source Code: The source packages for openorb_tools are available from the original software site, or may be
acquired from Cambium. To obtain the software from Cambium, please contact Cambium using the methods
described in this document.
License:
The OpenORB Community Software License, Version 1.0
Copyright (C) 2002 The OpenORB Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. The end-user documentation included with the redistribution, if any, must include the following
acknowledgment: "This product includes software developed by the OpenORB Community Project
(http://sourceforge.net/projects/openorb/)." together with the due credit statements listed below. Alternately,
this acknowledgment and due credits may appear in the soft- ware itself, if and wherever such third-party
acknowledgments normally appear.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE MEMBERS OF THE OPENORB COMMUNITY PROJECT OR ITS CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This software consists of voluntary contributions made by many individuals to the OpenORB Community Project.
For more information on the OpenORB Community Project, please refer to
http://sourceforge.net/projects/openorb/.
Due Credits
This product includes software developed by the Apache Software Foundation (http://www.apache.org/),
including the Avalon Framework, Avalon Logkit, and related Excalibur utilities. Due credit to the Apache Software
Foundation is hereby acknowledged.
This product is derived from initial works published under the Exolab Group, (http://www.exolab.org). Due credit
to the Exolab Group is hereby acknowledged. Parts of this software are derived from and subject to the terms of
the Exolab license. A copy of the Exolab license is contained in respective distributions.
Exolab Group License
Copyright (C) 1999-2001 Intalio, Inc. All Rights Reserved.
164
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Redistribution and use of this software and associated documentation ("Software"), with or without modification,
are permitted provided that the following conditions are met:
1. Redistributions of source code must retain copyright statements and notices. Redistributions must also contain a
copy of this document.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. The name "ExoLab" must not be used to endorse or promote products derived from this Software without prior
written permission of ExoLab Group. For written permission, please contact info@exolab.org.
4. Products derived from this Software may not be called "ExoLab" nor may "ExoLab" appear in their names
without prior written permission of ExoLab Group. Exolab is a registered trademark of ExoLab Group.
5. Due credit should be given to the ExoLab Group (http://www.exolab.org).
THIS SOFTWARE IS PROVIDED BY INTALIO, INC. AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESSED OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL INTALIO, INC. OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
jython.jar
Version: 2.1
Description: Jython is an implementation of the high-level, dynamic, object-oriented language Python written in
100% Pure Java, and seamlessly integrated with the Java platform. It thus allows you to run Python on any Java
platform.
Software Site: http://www.jython.org
Source Code: The source packages for Jython are available from the original software site, or may be acquired
from Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in
this document.
License:
A. TERMS AND CONDITIONS FOR ACCESSING OR OTHERWISE USING JYTHON PYTHON SOFTWARE FOUNDATION
LICENSE VERSION 2
1. This LICENSE AGREEMENT is between the Python Software Foundation ("PSF"), and the Individual or
Organization ("Licensee") accessing and otherwise using this software ("Jython") in source or binary form and its
associated documentation.
2. Subject to the terms and conditions of this License Agreement, PSF hereby grants Licensee a nonexclusive,
royalty-free, world-wide license to reproduce, analyze, test, perform and/or display publicly, prepare derivative
works, distribute, and otherwise use Jython alone or in any derivative version, provided, however, that PSF's
License Agreement and PSF's notice of copyright, i.e., "Copyright (c) 2007 Python Software Foundation; All Rights
Reserved" are retained in Jython alone or in any derivative version prepared by Licensee.
3. In the event Licensee prepares a derivative work that is based on or incorporates Jython or any part thereof, and
wants to make the derivative work available to others as provided herein, then Licensee hereby agrees to include
in any such work a brief summary of the changes made to Jython.
4. PSF is making Jython available to Licensee on an "AS IS" basis. PSF MAKES NO REPRESENTATIONS OR
WARRANTIES, EXPRESS OR IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, PSF MAKES NO AND DISCLAIMS
165
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
166
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
3. The end-user documentation included with the redistribution, if any, must include the following
acknowledgment:
The original concept and code base for P6Spy was conceived and developed by Andy Martin, Ph.D. who
generously contributed the first complete release to the public under this license. This product was due to
the pioneering work of Andy that began in December of 1995 developing applications that could seamlessly
be deployed with minimal effort but with dramatic results. This code is maintained and extended by Jeff Goke
and with the ideas and contributions of other P6Spy contributors. (http://www.p6spy.com) Alternately, this
acknowledgment may appear in the software itself, if and wherever such third-party acknowledgments
normally appear.
4. The names "P6Spy", "Jeff Goke", and "Andy Martin" must not be used to endorse or promote products derived
from this software without prior written permission. For written permission, please contact license@p6spy.com.
5. Products derived from this software may not be called "P6Spy" nor may "P6Spy" appear in their names without
prior written permission of Jeff Goke and Andy Martin.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Trademark Notices
Sun, the Sun logo, Sun Microsystems, JavaSoft, JavaBeans, JDK, Java, HotJava, HotJava Views, Visual Java, Solaris,
NEO, Joe, Netra, NFS, ONC, ONC+, OpenWindows, PC-NFS, SNM, SunNet Manager, Solaris sunburst design,
Solstice, SunCore, SolarNet, SunWeb, Sun Workstation, The Network Is The Computer, ToolTalk, Ultra,
Ultracomputing, Ultraserver, Where The Network Is Going, Sun WorkShop, XView, Java WorkShop, the Java Coffee
Cup logo, and Visual Java are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States
and other countries.
Windows, WindowsNT, and Win32 are registered trademarks of Microsoft Corp.
JBoss and JBoss Group are trademarks of Marc Fleury under operation by JBoss Group, LLC.
Sybase, SQL Anywhere, and Adaptive Server Anywhere are trademarks of Sybase, Inc.
Microsoft SQL Server is a trademark of the Microsoft Corporation.
BEA, WebLogic, Tuxedo, and Jolt are registered trademarks, and How Business Becomes E-Business, BEA WebLogic
E-Business Platform, BEA Builder, BEA eLink, BEA WebLogic Enterprise, BEA WebLogic Express, BEA WebLogic
Integration, BEA WebLogic Personalization Server, BEA WebLogic Portal, and BEA WebLogic Server are trademarks
of BEA Systems, Inc.
Oracle is a registered trademark, and ConText, Oracle Alliance and Oracle8 are trademarks or registered
trademarks of Oracle Corporation.
DB2, DB2 OLAP Server, WebSphere, and IBM are trademarks or registered trademarks of International.
Business Machines Corporation in the United States, other countries or both.
MySQL is a trademark of MySQL AB in the United States and other countries.
Other product names mentioned herein and throughout the this web site are the trademarks of their respective
owners.
Zlib
Version: 1.1.14
Description: Compression library used by libpng
167
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
168
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
RIGHTS. COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL
DAMAGES ARISING OUT OF ANY USE OF THE SOFTWARE OR DOCUMENTATION.
The name and trademarks of copyright holders may NOT be used in advertising or publicity pertaining to the
software without specific, written prior permission. Title to copyright in this software and any associated
documentation will at all times remain with copyright holders.
LibPNG
Version: 1.2.5
Description: PNG encoding/decoding
Software Site: http://www.libpng.org/pub/png/libpng.html
Source Code: The source packages for PNG are available from the original software site, or may be acquired from
Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in this
document.
License:
This copy of the libpng notices is provided for your convenience. In case of any discrepancy between this copy and
the notices in the file png.h that is included in the libpng distribution, the latter shall prevail.
COPYRIGHT NOTICE, DISCLAIMER, and LICENSE:
If you modify libpng you may insert additional notices immediately following this sentence.
libpng versions 1.2.6, August 15, 2004, through 1.2.35, February 14, 2009, are Copyright (c) 2004, 2006-2008 Glenn
Randers-Pehrson, and are distributed according to the same disclaimer and license as libpng-1.2.5 with the
following individual added to the list of Contributing Authors:
Cosmin Truta
libpng versions 1.0.7, July 1, 2000, through 1.2.5 - October 3, 2002, are Copyright (c) 2000-2002 Glenn Randers-
Pehrson, and are distributed according to the same disclaimer and license as libpng-1.0.6 with the following
individuals added to the list of Contributing Authors:
Simon-Pierre Cadieux
Eric S. Raymond
Gilles Vollant
and with the following additions to the disclaimer:
There is no warranty against interference with your enjoyment of the library or against infringement. There is
no warranty that our efforts or the library will fulfill any of your particular purposes or needs. This library is
provided with all faults, and the entire risk of satisfactory quality, performance, accuracy, and effort is with
the user.
libpng versions 0.97, January 1998, through 1.0.6, March 20, 2000, are Copyright (c) 1998, 1999 Glenn Randers-
Pehrson, and are distributed according to the same disclaimer and license as libpng-0.96, with the following
individuals added to the list of Contributing Authors:
Tom Lane
Glenn Randers-Pehrson
Willem van Schaik
libpng versions 0.89, June 1996, through 0.96, May 1997, are Copyright (c) 1996, 1997 Andreas Dilger Distributed
according to the same disclaimer and license as libpng-0.88, with the following individuals added to the list of
Contributing Authors:
John Bowler
Kevin Bracey
Sam Bushell
Magnus Holmgren
169
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Greg Roelofs
Tom Tanner
libpng versions 0.5, May 1995, through 0.88, January 1996, are Copyright (c) 1995, 1996 Guy Eric Schalnat, Group
42, Inc. For the purposes of this copyright and license, "Contributing Authors" is defined as the following set of
individuals:
Andreas Dilger
Dave Martindale
Guy Eric Schalnat
Paul Schmidt
Tim Wegner
The PNG Reference Library is supplied "AS IS". The Contributing Authors and Group 42, Inc. disclaim all warranties,
expressed or implied, including, without limitation, the warranties of merchantability and of fitness for any
purpose. The Contributing Authors and Group 42, Inc. assume no liability for direct, indirect, incidental, special,
exemplary, or consequential damages, which may result from the use of the PNG Reference Library, even if
advised of the possibility of such damage.
Permission is hereby granted to use, copy, modify, and distribute this source code, or portions hereof, for any
purpose, without fee, subject to the following restrictions:
1. The origin of this source code must not be misrepresented.
2. Altered versions must be plainly marked as such and must not be misrepresented as being the original source.
3. This Copyright notice may not be removed or altered from any source or altered source distribution.
The Contributing Authors and Group 42, Inc. specifically permit, without fee, and encourage the use of this source
code as a component to supporting the PNG file format in commercial products. If you use this source code in a
product, acknowledgment is not required but would be appreciated.
A "png_get_copyright" function is available, for convenient use in "about" boxes and the like:
printf("%s",png_get_copyright(NULL));
Also, the PNG logo (in PNG format, of course) is supplied in the files "pngbar.png" and "pngbar.jpg (88x31) and
"pngnow.png" (98x31).
Libpng is OSI Certified Open Source Software. OSI Certified Open Source is a certification mark of the Open Source
Initiative.
Glenn Randers-Pehrson
glennrp@users.sourceforge.net
February 14, 2009
Packages That Use GNU Lesser General Public License Version 2.1
The following nine packages use the GNU LESSER GENERAL PUBLIC LICENSE, Version 2.1, February 1999, whose full
text is provided under GNU Lesser General Public License Version 2.1, February 1999.
jasperreports.jar
Version: 1.0
Description: Jasper Reports
Software Site: http://sourceforge.net/project/showfiles.php?group_id=36382&package_id=28579
Source Code: The source packages for jasperreports.jar are available from the original software site, or may be
acquired from Cambium. To obtain the software from Cambium, please contact Cambium using the methods
described in this document.
170
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Jfreechart.jar
Version: 0.9.15
Description: Charting tool
Software Site: http://sourceforge.net/project/showfiles.php?group_id=15494&package_id=12428
Source Code: The source packages for Jfreechart.jar are available from the original software site, or may be
acquired from Cambium. To obtain the software from Cambium, please contact Cambium using the methods
described in this document.
bsh-1.2b3.jar
Version: 1.2
Description: Scripting files
Software Site: Source code not available from AdventNet
Source Code: The source packages for bsh-1.2b3.jar are available from the original software site, or may be
acquired from Cambium. To obtain the software from Cambium, please contact Cambium using the methods
described in this document.
jvcs.jar
Version: 2.1
Description: Scripting tool
Software Site: http://www.jcvs.org/download/jcvs/jcvs-522.tgz
Source Code: The source packages for Jvcs are available from the original software site, or may be acquired from
Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in this
document.
ftp.jar
Version: 2.1
Description: FTP package
Software Site: http://www.enterprisedt.com/downloads/ftp/ftp-1.1.tar.gz
Source Code: The source packages for FTP are available from the original software site, or may be acquired from
Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in this
document.
jcommon
Version: 1.0.0
Description: General purpose classes used by Jfree chart
Software Site: http://www.jfree.org/jcommon/download/
Source Code: The source packages for jcommon are available from the original software site, or may be acquired
from Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in
this document.
MySQL Connector
Version:
Linux-MM.MySQL - 3.0.8
Solaris-MM.MySQL - 3.0.8
Windows-MM.MySQL - 3.0.8
Description: JDBC Driver
Software Site: http://Mysql.com
Source Code: The source packages for MySQL Connector are available from the original software site, or may be
acquired from Cambium. To obtain the software from Cambium, please contact Cambium using the methods
described in this document.
171
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
itext-1.02b.jar
Version: 1.0.2
Description: Text Parser
Software Site: http://www.lowagie.com/iText/
Source Code: The source packages for itext are available from the original software site, or may be acquired from
Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in this
document.
j2ssh-common.jar, j2ssh-core.jar (SSHTools)
Version: j2ssh0.2.7
Description: SSH Tools
Software Site: http://sourceforge.net/project/showfiles.php?group_id=60894&package_id=57233
Source Code: The source packages for SSH Tools are available from the original software site, or may be acquired
from Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in
this document.
GNU Lesser General Public License
Version 2.1, February 1999
Copyright (C) 1991, 1999 Free Software Foundation, Inc.
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not
allowed.
[This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public
License, version 2, hence the version number 2.1.]
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the
GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make
sure the software is free for all its users.
This license, the Lesser General Public License, applies to some specially designated software packages--typically
libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we
suggest you first think carefully about whether this license or the ordinary General Public License is the better
strategy to use in any particular case, based on the explanations below.
When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are
designed to make sure that you have the freedom to distribute copies of free software (and charge for this service
if you wish); that you receive source code or can get it if you want it; that you can change the software and use
pieces of it in new free programs; and that you are informed that you can do these things.
To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you
to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of
the library or if you modify it.
For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the
rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other
code with the library, you must provide complete object files to the recipients, so that they can relink them with
the library after making changes to the library and recompiling it. And you must show them these terms so they
know their rights.
We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license,
which gives you legal permission to copy, distribute and/or modify the library.
To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the
library is modified by someone else and passed on, the recipients should know that what they have is not the
172
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
original version, so that the original author's reputation will not be affected by problems that might be introduced
by others.
Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a
company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent
holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with
the full freedom of use specified in this license.
Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license,
the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the
ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries
into non-free programs.
When a program is linked with a library, whether statically or using a shared library, the combination of the two is
legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore
permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License
permits more lax criteria for linking other code with the library.
We call this license the "Lesser" General Public License because it does Less to protect the user's freedom than the
ordinary General Public License. It also provides other free software developers Less of an advantage over
competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for
many libraries. However, the Lesser license provides advantages in certain special circumstances.
For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain
library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the
library. A more frequent case is that a free library does the same job as widely used non-free libraries. In this case,
there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License.
In other cases, permission to use a particular library in non-free programs enables a greater number of people to
use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables
many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.
Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of
a program that is linked with the Library has the freedom and the wherewithal to run that program using a
modified version of the Library.
The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the
difference between a "work based on the library" and a "work that uses the library". The former contains code
derived from the library, whereas the latter must be combined with the library in order to run.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License Agreement applies to any software library or other program which contains a notice placed by the
copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General
Public License (also called "this License"). Each licensee is addressed as "you".
A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with
application programs (which use some of those functions and data) to form executables.
The "Library", below, refers to any such software library or work which has been distributed under these terms. A
"work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a
work containing the Library or a portion of it, either verbatim or with modifications and/or translated
straightforwardly into another language. (Hereinafter, translation is included without limitation in the term
"modification".)
"Source code" for a work means the preferred form of the work for making modifications to it. For a library,
complete source code means all the source code for all modules it contains, plus any associated interface
definition files, plus the scripts used to control compilation and installation of the library.
Activities other than copying, distribution and modification are not covered by this License; they are outside its
scope. The act of running a program using the Library is not restricted, and output from such a program is covered
173
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for
writing it). Whether that is true depends on what the Library does and what the program that uses the Library
does.
1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any
medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice
and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any
warranty; and distribute a copy of this License along with the Library.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty
protection in exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library,
and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also
meet all of these conditions:
* a) The modified work must itself be a software library.
* b) You must cause the files modified to carry prominent notices stating that you changed the files and the
date of any change.
* c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of
this License.
* d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application
program that uses the facility, other than as an argument passed when the facility is invoked, then you must
make a good faith effort to ensure that, in the event an application does not supply such function or table,
the facility still operates, and performs whatever part of its purpose remains meaningful.
(For example, a function in a library to compute square roots has a purpose that is entirely well-defined
independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table
used by this function must be optional: if the application does not supply it, the square root function must still
compute square roots.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived
from the Library, and can be reasonably considered independent and separate works in themselves, then this
License, and its terms, do not apply to those sections when you distribute them as separate works. But when you
distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole
must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus
to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather,
the intent is to exercise the right to control the distribution of derivative or collective works based on the Library.
In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on
the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this
License.
3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given
copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the
ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the
ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not
make any other change in these notices.
Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public
License applies to all subsequent copies and derivative works made from that copy.
This option is useful when you wish to copy part of the code of the Library into a program that is not a library.
4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or
executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete
corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2
above on a medium customarily used for software interchange.
174
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
If distribution of object code is made by offering access to copy from a designated place, then offering equivalent
access to copy the source code from the same place satisfies the requirement to distribute the source code, even
though third parties are not compelled to copy the source along with the object code.
5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by
being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a
derivative work of the Library, and therefore falls outside the scope of this License.
However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the
Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is
therefore covered by this License. Section 6 states terms for distribution of such executables.
When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for
the work may be a derivative work of the Library even though the source code is not. Whether this is true is
especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for
this to be true is not precisely defined by law.
If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and
small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of
whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still
fall under Section 6.)
Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the
terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked
directly with the Library itself.
6. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the
Library to produce a work containing portions of the Library, and distribute that work under terms of your choice,
provided that the terms permit modification of the work for the customer's own use and reverse engineering for
debugging such modifications.
You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its
use are covered by this License. You must supply a copy of this License. If the work during execution displays
copyright notices, you must include the copyright notice for the Library among them, as well as a reference
directing the user to the copy of this License. Also, you must do one of these things:
* a) Accompany the work with the complete corresponding machine-readable source code for the Library
including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above);
and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses
the Library", as object code and/or source code, so that the user can modify the Library and then relink to
produce a modified executable containing the modified Library. (It is understood that the user who changes
the contents of definitions files in the Library will not necessarily be able to recompile the application to use
the modified definitions.)
* b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1)
uses at run time a copy of the library already present on the user's computer system, rather than copying
library functions into the executable, and (2) will operate properly with a modified version of the library, if
the user installs one, as long as the modified version is interface-compatible with the version that the work
was made with.
* c) Accompany the work with a written offer, valid for at least three years, to give the same user the
materials specified in Subsection 6a, above, for a charge no more than the cost of performing this
distribution.
* d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent
access to copy the above specified materials from the same place.
* e) Verify that the user has already received a copy of these materials or that you have already sent this user
a copy.
175
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
For an executable, the required form of the "work that uses the Library" must include any data and utility
programs needed for reproducing the executable from it. However, as a special exception, the materials to be
distributed need not include anything that is normally distributed (in either source or binary form) with the major
components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that
component itself accompanies the executable.
It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not
normally accompany the operating system. Such a contradiction means you cannot use both them and the Library
together in an executable that you distribute.
7. You may place library facilities that are a work based on the Library side-by-side in a single library together with
other library facilities not covered by this License, and distribute such a combined library, provided that the
separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and
provided that you do these two things:
* a) Accompany the combined library with a copy of the same work based on the Library, uncombined with
any other library facilities. This must be distributed under the terms of the Sections above.
* b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library,
and explaining where to find the accompanying uncombined form of the same work.
8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this
License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will
automatically terminate your rights under this License. However, parties who have received copies, or rights, from
you under this License will not have their licenses terminated so long as such parties remain in full compliance.
9. You are not required to accept this License, since you have not signed it. However, nothing else grants you
permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do
not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you
indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or
modifying the Library or works based on it.
10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a
license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and
conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein.
You are not responsible for enforcing compliance by third parties with this License.
11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not
limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that
contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot
distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations,
then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit
royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the
only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the
section is intended to apply, and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to
contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software
distribution system which is implemented by public license practices. Many people have made generous
contributions to the wide range of software distributed through that system in reliance on consistent application
of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other
system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted
interfaces, the original copyright holder who places the Library under this License may add an explicit geographical
distribution limitation excluding those countries, so that distribution is permitted only in or among countries not
thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.
176
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License
from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to
address new problems or concerns.
Each version is given a distinguishing version number. If the Library specifies a version number of this License
which applies to it and "any later version", you have the option of following the terms and conditions either of that
version or of any later version published by the Free Software Foundation. If the Library does not specify a license
version number, you may choose any version ever published by the Free Software Foundation.
14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are
incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free
Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our
decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of
promoting the sharing and reuse of software generally.
NO WARRANTY
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE
EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY
IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
REPAIR OR CORRECTION.
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT
HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE,
BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL
DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Libraries
If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend
making it free software that everyone can redistribute and change. You can do so by permitting redistribution
under these terms (or, alternatively, under the terms of the ordinary General Public License).
To apply these terms, attach the following notices to the library. It is safest to attach them to the start of each
source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright"
line and a pointer to where the full notice is found.
one line to give the library's name and an idea of what it does.
Copyright (C) year name of author
This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General
Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option)
any later version.
This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the
implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General
Public License for more details.
You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to
the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
Also add information on how to contact you by electronic and paper mail.
177
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright
disclaimer" for the library, if necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in
the library `Frob' (a library for tweaking knobs) written by James Random Hacker.
signature of Ty Coon, 1 April 1990
Ty Coon, President of Vice
That's all there is to it!
The following four packages use the Apache Software License, Version 1.1, © 2001-2003, whose full text is
provided under Apache Software License Version 1.1.
Log4j
Version: 1.2.12
Description: Log Framework
Software Site: http://logging.apache.org/log4j/1.2/index.html
Source Code: The source packages for Log4j are available from the original software site, or may be acquired from
Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in this
document.
Struts
Version: 1.1
Description: Web Framework
Software Site: http://www.apache.org/dist/jakarta/struts/binaries/jakarta-struts-1.1.zip
Source Code: The source packages for Struts are available from the original software site, or may be acquired from
Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in this
document.
Apache
Version: 2.0.47
Description: The Apache HTTP Server provides a secure, efficient and extensible server that provides HTTP
services in sync with the current HTTP standards.
Software Site: http://www.apache.org/dist/httpd/
Source Code: The source packages for Apache are available from the original software site, or may be acquired
from Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in
this document.
TomCat
Version: 4.1.27
Description: Apache Tomcat is an implementation of the Java Servlet and JavaServer Pages technologies. The Java
Servlet and JavaServer Pages specifications are developed under the Java Community Process.
Software Site: http://tomcat.apache.org/download-41.cgi
Source Code: The source packages for TomCat are available from the original software site, or may be acquired
from Cambium. To obtain the software from Cambium, please contact Cambium using the methods described in
this document.
Apache Software License
Version 1.1
Copyright (c) 2001-2003 Ant-Contrib project. All rights reserved.
178
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. The end-user documentation included with the redistribution, if any, must include the following
acknowledgment:
"This product includes software developed by the Ant-Contrib project
(http://sourceforge.net/projects/ant-contrib)." Alternately, this acknowledgment may appear in the software
itself, if and wherever such third-party acknowledgments normally appear.
4. The name Ant-Contrib must not be used to endorse or promote products derived from this software without
prior written permission. For written permission, please contact ant-contrib-developers@lists.sourceforge.net.
5. Products derived from this software may not be called "Ant-Contrib" nor may "Ant-Contrib" appear in their
names without prior written permission of the Ant-Contrib project.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE ANT-CONTRIB PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
179
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Abbreviations
API Application Programming Interface
BZ2 BZIP2 compression scheme for file data; not as efficient as PBF for offline map
data
IP Internet Protocol
UI User Interface
181
WM Release 4.4 and Later Server Administration Guide Issue 2
October 2015
Technical Support
Before you contact the Cambium Networks support representatives, it is typically advisable to run the
Support Tool and avoid deleting any of the files that it generates. After you run the tool and attempt
to solve the problem by using the documentation and the troubleshooting methods that its
procedures and descriptions imply, you can contact your designated representative as indicated in
Contacting Support Representatives.
183
Issue 2 WM Release 4.4 and Later Server Administration Guide
October 2015
Instructions for running the tool from the client application are provided in the user guide section
titled "Technical Support."
184