Bam 2.0

download Bam 2.0

of 1

Transcript of Bam 2.0

  • 8/11/2019 Bam 2.0

    1/1

    MOTOROLA CANOPY

    WIRELESS BROADBAND

    BANDWIDTH AND

    AUTHENTICATION

    MANAGERRelease 2.0

    BENEFITS OF THE BANDWIDTH AND

    AUTHENTICATION MANAGER:

    Network operators control Canopy system modules via web

    interfaces to achieve the following benefits:

    Offer tiered servicestailored to the bandwidth demand of

    business, SOHO and residential subscribers.

    Increase the level of securityand keep out hackers by

    requiring positive authentication from a central location.

    Manage Network Assets efficientlyby controlling license

    management from a central location.

    FEATURES OF RELEASE 2.0

    RADIUS Authenticationenables network operators to

    exchange information freely from the Canopy system and

    therefore, will not need to maintain separate databases.

    Support for a Variety of Databasesmeans that BAM 2.0 will

    work with more installed operations systems including RADIUS

    servers, or to a BAM specific database through ODBC (Postgres

    and MySQL are currently supported).

    Server-Based License Managementsaves time and effortbecause BAM users will no longer need to manually manage

    AP specific licenses.

    SM Status Controlprovides the ability to suspend individual

    Subscriber Modules without having to delete them from the

    database saving time managing the Canopy system.

    A centralized view of the network makes it easier to manage

    resources efficiently. Motorolas Canopy system is enhanced

    with network management tools that improve securitymanagement, network operations and the installation process.

    The Bandwidth and Authentication Manager (BAM) Release 2.0

    reduces administrative effort and interfaces the Canopy

    network to RADIUS databases.

    OVERVIEW

    The BAM provides network operators bandwidth allocation

    control to assign maximum data rates per subscriber including:

    Sustained Uplink, Uplink Burst Allocation, Sustained Downlink

    Data Rate and Downlink Burst. In addition, the BAM is the

    central point of authentication in the Canopy system.

    Complementing the Canopy systems data encryption, the BAMprovides an additional layer of security to restrict access to

    system data.

    Motorola encourages customers to migrate to BAM Release

    2.0 software. Existing BAM customers can upgrade to release

    2.0 at no additional charge.

    MOTOROLA and the Stylized M Logo are registered in the U.S. Patent and Trademark Office. Canopy is a trademark o

    Motorola. All other product or service names are the property of their respective owners.Motorola, Inc. 2004.

    ver-061904

    For more information about how the Canopy system can extend your

    network and services, provide competitive advantage and outstanding

    ROI, call 866-515-5825 in the U.S. 800-795-1530 internationally or

    visit us at www.motorola.com/canopy

    Canopy System

    Software Release

    4.x and higher

    BAM

    2.0

    Compatibility

    Red Hat

    Linux OS

    Enterprise Version 3(WS or ES)

    IMPROVE INFORMATION

    MANAGEMENT EFFICIENCY