Cambium Networks cnMatrix EX1K User manual

cnMatrix EX1K Switch
Basic Configuration Guide

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 1
Thank you for choosing the cnMatrix switch, a Cambium Networks communications device. Before you begin
installing the switch, verify you have all the package contents available, and a PC with SSH client, such as PuTTY or
OpenSSH SSH Client.
Package Contents
Rack mount ears (2x) with screws (8x) are included
with the 28-port models.
(Spare rack mount ears: MX-EXTXFULLA-0)
A rack mount kit for the 10-port models can be ordered
as an optional accessory: MX-EXTXHALFA-0
cnMatrix Switch
EX1010 models:
EX1028 models:
Power Cord (separate accessory)

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 2
Product Overview
The cnMatrix switch comes in four SKUs to support various deployment scenarios
Powering Up
Connect the power cord to the power inlet, and then plug the power cord into a wall socket.
Model Name / Part
Number
Number
of Ports
Power
over
Ethernet
Throughput Switch
cnMatrix EX1010
/
MX-EX1010xxA-0
10 No 20 Gbps
cnMatrix EX1010-P
/
MX-EX1010PxA-0
10 Yes 20 Gbps
cnMatrix EX1028
/
MX-EX1028xxA-0
28 No 128 Gbps
cnMatrix EX1028-P
/
MX-EX1028PxA-0
28 Yes 128 Gbps
When the switch is booting up, the illuminated Cambium Networks logo will be blinking blue. When the
switch is fully up and running, the illuminated Cambium Networks logo is solid blue.

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 3
Default Configuration
When booting up for the first time the cnMatrix EX1K switch will try to acquire a dynamic IP address through DHCP.
If a DHCP Server is not present on the network, the switch will fall back to 192.168.1.1 static IP address on the In-
Band ports.
Note: DHCP is enabled by default on In Band Ports (VLAN1).
Defaultlogininformation:
Username: admin
Password: admin
Configure Management PC
1 For Windows operating system, open the Control Panel window.
2 In the Control Panel window, select the View network status and
tasks option. The Network and Sharing Center window is displayed.
3 Click the Change adapter settings option. The Network Connections
window is displayed.
4 Double-click the interface connected to the switch. The interface
Properties window is displayed.
5 Double click on the Internet Protocol Version 4 (TCP/IPv4) option.
6 The Internet Protocol Version 4 (TCP/IPv4) Properties is displayed.
Select Use the following IP address.
Set The IP address of the interface to 192.168.1.10 and the Subnet
mask to 255.255.255.0

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 4
Logging in to the switch
1
Use PuTTY SSH client.
2 On the PuTTY Configuration
window, in the Host Name field,
enter 192.168.1.1 IP address
and in the Port field, enter the 22
value.
3 Click Open. The login prompt is
displayed.
4 In the cnMatrix login prompt
enter the default username:
admin
5 In the Password prompt enter the
default login password: admin

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 5
Hardware Overview
Specifications
cnMatrix Models EX2028-P EX2028 EX2010-P EX2010
MTBF (hours) 285.350.90 432.283.26 338.917.20 806.354.10
Power budget 400W n/a 100W n/a
Power supply AC/Internal AC/Internal AC/Internal AC/Internal
Weight 3.96 kg (8.75 lb) 2.77 kg (6.1 lb) 1.99 kg (4.375 lb) 1.6 kg (3.5375 lb)
Dimensions 44 x 4.4 x 25 cm
(17.3 x 1.75 x 9.85 in)
44 x 4.4 x 20.9 cm
(17.3 x 1.75 x 8.22 in)
21 x 4.4 x 25 cm
(8.26 x 1.75 x 9.85 in)
21 x 4.4 x 25 cm
(8.26 x 1.75 x 9.85 in)
LEDs per port Link/Activity, PoE Link/Activity, PoE Link/Activity, PoE Link/Activity, PoE
Rack mountable Yes 1U Yes 1U Yes 1U Yes 1U
Operating Temperature -0°C to + 50°C
(+32°F to + 122°F)
-0°C to + 50°C
(+32°F to + 122°F)
-0°C to + 50°C
(+32°F to + 122°F)
-0°C to + 50°C
(+32°F to + 122°F)
Operating humidity +55° at 95% RH +55° at 95% RH +55° at 95% RH +55° at 95% RH
Storage temperature -40°C to +70°C
(-40°F to +158°F)
-40°C to +70°C
(-40°F to +158°F)
-40°C to +70°C
(-40°F to +158°F)
-40°C to +70°C
(-40°F to +158°F)
Power LED
cnMatrix Logo (Power) LED
is continuously blue – the
switch is operational.
cnMatrix Logo (Power) LED
is blinking blue – the switch is
initializing.
Ports
Data ports used for traffic
forwarding. Orange
border ports indicate
PoE+ up to 30W.
(802.3af/at)
Green border ports
indicate PoE+ up to
60W. (802.3af/at/bt)
Fiber Ports
1 Gig fiber ports (SFP).
- 4 available ports on the
EX1028 / EX1028-P.
- 2 available ports on the
EX1010/ EX1010-P.
Console
RJ45 connection
for console access.
Reset button
Simple reboot:
Press and release
within 10 seconds.
Factory default:
Press and hold for
> 10 seconds.
cnMaestro LED
Blinking blue: Connecting to
cnMaestro.
Solid blue: Connected to
cnMaestro.

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 6
Safety Notice
Legal and Reference Information
This chapter provides legal notices including software license agreements.
Attention
Intentional or unintentional changes or modifications to the equipment must not be made unless under the
express consent of the party responsible for compliance. Any such modifications could void the user’s
authority to operate the equipment and will void the manufacturer’s warranty.
The following topics are described in this chapter:
Cambium Networks End User License Agreement on Page ____
Open Source Components incorporated in the Hardware and associated notices on Page ____
Hardware Warranty on Page ____

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 7
Cambium Networks End User License Agreement
ACCEPTANCE OF THIS AGREEMENT
In connection with Cambium Networks’ delivery of certain proprietary software or products containing
embedded or pre-loaded proprietary software, or both, Cambium Networks is willing to license this certain
proprietary software and the accompanying documentation to you only on the condition that you accept all
the terms in this End User License Agreement (“Agreement”). IF YOU DO NOT AGREE TO THE TERMS
OF THIS AGREEMENT, DO NOT USE THE PRODUCT OR
INSTALL THE SOFTWARE. INSTEAD, YOU MAY, FOR A FULL REFUND, RETURN THIS PRODUCT
TO THE LOCATION WHERE YOU ACQUIRED IT OR PROVIDE WRITTEN VERIFICATION OF
DELETION OF ALL COPIES OF THE SOFTWARE. ANY USE OF THE SOFTWARE, INCLUDING BUT
NOT LIMITED TO USE ON THE PRODUCT, WILL CONSTITUTE YOUR ACCEPTANCE TO THE TERMS
OF THIS AGREEMENT.
DEFINITIONS
In this Agreement, the word “Software” refers to the set of instructions for computers, in executable form
and in any media, (which may include diskette, CD-ROM, downloadable internet, hardware, or firmware)
licensed to you. The word “Documentation” refers to electronic or printed manuals and accompanying
instructional aids licensed to you. The word “Product” refers to Cambium Networks’ fixed wireless
broadband devices for which the Software and Documentation is licensed for use.
GRANT OF LICENSE
Cambium Networks Limited (“Cambium”) grants you (“Licensee” or “you”) a personal, nonexclusive, non-
transferable license to use the Software and Documentation subject to the Conditions of Use set forth in
“Conditions of use” and the terms and conditions of this Agreement. Any terms or conditions relating to the
Software and Documentation appearing on the face or reverse side of any purchase order, purchase order
acknowledgment or other order document that are different from, or in addition to, the terms of this
Agreement will not be binding on the parties, even if payment is accepted.
CONDITIONS OF USE
Any use of the Software and Documentation outside of the conditions set forth in this Agreement is strictly
prohibited and will be deemed a breach of this Agreement.
1. Only you, your employees or agents may use the Software and Documentation. You will take all
necessary steps to insure that your employees and agents abide by the terms of this Agreement.
2. You will use the Software and Documentation (i) only for your internal business purposes; (ii) only
as described in the Software and Documentation; and (iii) in strict accordance with this Agreement.
3. You may use the Software and Documentation, provided that the use is in conformance with the
terms set forth in this Agreement.
4. Portions of the Software and Documentation are protected by United States copyright laws,
international treaty provisions, and other applicable laws. Therefore, you must treat the Software
like any other copyrighted material (for example, a book or musical recording) except that you may
either: (i) make 1 copy of the transportable part of the Software (which typically is supplied on
diskette, CD-ROM, or downloadable internet), solely for back-up purposes; or (ii) copy the
transportable part of the Software to a PC hard disk, provided you keep the original solely for
backup purposes. If the Documentation is in printed form, it may not be copied. If the
Documentation is in electronic form, you may print out 1 copy, which then may not be copied. With
regard to the copy made for backup or archival purposes, you agree to reproduce any Cambium
Networks copyright notice, and other proprietary legends appearing thereon. Such copyright
notice(s) may appear in any of several forms, including machine-readable form, and you agree to
reproduce such notice in each form in which it appears, to the extent it is physically possible to do
so. Unauthorized duplication of the Software or Documentation constitutes copyright infringement,
and in the United States is punishable in federal court by fine and imprisonment.

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 8
5. You will not transfer, directly or indirectly, any product, technical data or software to any country for
which the United States Government requires an export license or other governmental approval
without first obtaining such license or approval.
TITLE AND RESTRICTIONS
If you transfer possession of any copy of the Software and Documentation to another party outside of the
terms of this agreement, your license is automatically terminated. Title and copyrights to the Software and
Documentation and any copies made by you remain with Cambium Networks and its licensors. You will
not, and will not permit others to: (i) modify, translate, decompile, bootleg, reverse engineer, disassemble,
or extract the inner workings of the Software or Documentation, (ii) copy the look-and-feel or functionality
of the Software or Documentation; (iii) remove any proprietary notices, marks, labels, or logos from the
Software or Documentation; (iv) rent or transfer all or some of the Software or Documentation to any other
party without Cambium’s prior written consent; or (v) utilize any computer software or hardware which is
designed to defeat any copy protection device, should the Software and Documentation be equipped with
such a protection device. If the Software and Documentation is provided on multiple types of media (such
as diskette, CD-ROM, downloadable internet), then you will only use the medium which best meets your
specific needs, and will not loan, rent, lease, or transfer the other media contained in the package without
Cambium’s written consent. Unauthorized copying of the Software or Documentation, or failure to comply
with any of the provisions of this
Agreement will result in automatic termination of this license.
CONFIDENTIALITY
You acknowledge that all Software and Documentation contain valuable proprietary information and trade
secrets and that unauthorized or improper use of the Software and Documentation will
result in irreparable harm to Cambium Networks for which monetary damages would be inadequate and for
which Cambium Networks will be entitled to immediate injunctive relief. If applicable, you will limit access
to the Software and Documentation to those of your employees and agents who need to use the Software
and Documentation for your internal business purposes, and you will take appropriate action with those
employees and agents to preserve the
confidentiality of the Software and Documentation, using the same degree of care to avoid unauthorized or
improper disclosure as you use for the protection of your own proprietary software, but in no event less
than reasonable care. You have no obligation to preserve the confidentiality of any proprietary information
that: (i) was in the public domain at the time of disclosure; (ii) entered the public domain through no fault of
yours; (iii) was given to you free of any obligation to keep it confidential; (iv) is independently developed by
you; or (v) is disclosed as required by law provided that you notify Cambium Networks prior to such
disclosure and provide Cambium Networks with a reasonable opportunity to respond.
RIGHT TO USE CAMBIUM’S NAME
Except as required in “Conditions of use”, you will not, during the term of this Agreement or thereafter, use
any trademark of Cambium Networks, or any word or symbol likely to be confused
with any Cambium Networks trademark, either alone or in any combination with another word or words.
TRANSFER
The Software and Documentation may not be transferred to another party without the express written
consent of Cambium Networks, regardless of whether or not such transfer is accomplished by physical or
electronic means. Cambium’s consent may be withheld at its discretion and may be conditioned upon
transferee paying all applicable license fees and agreeing to be bound by this Agreement.
UPDATES
During the first 12 months after purchase of a Product, or during the term of any executed Maintenance
and Support Agreement for the Product, you are entitled to receive Updates. An “Update” means any code
in any form which is a bug fix, patch, error correction, or minor enhancement, but excludes any major feature
added to the Software. Updates are available for download at the support website.

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 9
Major features may be available from time to time for an additional license fee. If Cambium Networks makes
available to you major features and no other end user license agreement is provided, then the terms of this
Agreement will apply.
MAINTENANCE
Except as provided above, Cambium Networks is not responsible for maintenance or field service
of the Software under this Agreement.
DISCLAIMER
CAMBIUM NETWORKS DISCLAIMS ALL WARRANTIES OF ANY KIND, WHETHER EXPRESS,
IMPLIED, STATUTORY, OR IN ANY COMMUNICATION WITH YOU. CAMBIUM NETWORKS
SPECIFICALLY DISCLAIMS ANY WARRANTY INCLUDING THE IMPLIED WARRANTIES OF
MERCHANTABILTY, NONINFRINGEMENT, OR FITNESS FOR A PARTICULAR PURPOSE. THE
SOFTWARE AND DOCUMENTATION ARE PROVIDED “AS IS.” CAMBIUM NETWORKS DOES NOT
WARRANT THAT THE SOFTWARE WILL MEET YOUR REQUIREMENTS, OR THAT THE OPERATION
OF THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR FREE, OR THAT DEFECTS IN THE
SOFTWARE WILL BE CORRECTED. CAMBIUM NETWORKS MAKES NO WARRANTY WITH RESPECT
TO THE CORRECTNESS, ACCURACY, OR RELIABILITY OF THE SOFTWARE AND
DOCUMENTATION. Some jurisdictions do not allow the exclusion of implied warranties, so the above
exclusion may not apply to you.
LIMITATION OF LIABILITY
IN NO EVENT SHALL CAMBIUM NETWORKS BE LIABLE TO YOU OR ANY OTHER PARTY FOR ANY
DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, CONSEQUENTIAL, EXEMPLARY OR OTHER
DAMAGE ARISING OUT OF THE USE OR INABILITY TO USE THE PRODUCT (INCLUDING,
WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION,
LOSS OF BUSINESS INFORMATION OR ANY OTHER PECUNIARY LOSS, OR FROM ANY BREACH
OF WARRANTY, EVEN IF CAMBIUM NETWORKS HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES. (Some states do not allow the exclusion or limitation of
incidental or consequential damages, so the above exclusion or limitation may not apply to you.)
IN NO CASE SHALL CAMBIUM’S LIABILITY EXCEED THE AMOUNT YOU PAID FOR THE PRODUCT.
U.S. GOVERNMENT
If you are acquiring the Product on behalf of any unit or agency of the U.S. Government, the following
applies. Use, duplication, or disclosure of the Software and Documentation is subject to the restrictions set
forth in subparagraphs (c) (1) and (2) of the Commercial Computer Software – Restricted Rights clause at
FAR 52.227-19 (JUNE 1987), if applicable, unless being provided to the Department of Defense. If being
provided to the Department of Defense, use, duplication, or
disclosure of the Products is subject to the restricted rights set forth in subparagraph (c) (1) (ii) of the Rights
in Technical Data and Computer Software clause at DFARS 252.227-7013 (OCT 1988), if applicable.
Software and Documentation may or may not include a Restricted Rights notice, or other notice referring
specifically to the terms and conditions of this Agreement. The terms and conditions of this Agreement will
each continue to apply, but only to the extent that such terms and conditions are not inconsistent with the
rights provided to you under the aforementioned provisions of the FAR and DFARS, as applicable to the
particular procuring agency and procurement transaction.
TERM OF LICENSE
Your right to use the Software will continue in perpetuity unless terminated as follows. Your right to use the
Software will terminate immediately without notice upon a breach of this Agreement by you. Within 30 days
after termination of this Agreement, you will certify to Cambium Networks in writing that through your best
efforts, and to the best of your knowledge, the original and all copies, in whole or in part, in any form, of the
Software and all related material and Documentation, have been destroyed, except that, with prior written
consent from Cambium
Networks, you may retain one copy for archival or backup purposes. You may not sublicense, assign or
transfer the license or the Product, except as expressly provided in this Agreement. Any attempt to
otherwise sublicense, assign or transfer any of the rights, duties or obligations hereunder is null and void.

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 10
GOVERNING LAW
This Agreement is governed by the laws of the United States of America to the extent that they apply and
otherwise by the laws of the State of Illinois.
ASSIGNMENT
This agreement may not be assigned by you without Cambium’s prior written consent.
SURVIVAL OF PROVISIONS
The parties agree that where the context of any provision indicates an intent that it survives the term of this
Agreement, then it will survive.
ENTIRE AGREEMENT
This agreement contains the parties’ entire agreement regarding your use of the Software and may be
amended only in writing signed by both parties, except that Cambium Networks may modify this Agreement
as necessary to comply with applicable laws.
THIRD PARTY SOFTWARE
The software may contain one or more items of Third-Party Software supplied by other third-party suppliers.
The terms of this Agreement govern your use of any Third-Party Software UNLESS A SEPARATE THIRD-
PARTY SOFTWARE LICENSE IS INCLUDED, IN WHICH CASE YOUR USE OF THE THIRD-PARTY
SOFTWARE WILL THEN BE GOVERNED BY THE SEPARATE THIRD-PARTY LICENSE.
THIRD PARTY SOFTWARE
The software may contain one or more items of Third-Party Software supplied by other third-party suppliers.
The terms of this Agreement govern your use of any Third-Party Software UNLESS A SEPARATE THIRD-
PARTY SOFTWARE LICENSE IS INCLUDED, IN WHICH CASE YOUR USE OF THE THIRD-PARTY
SOFTWARE WILL THEN BE GOVERNED BY THE SEPARATE THIRD-PARTY LICENSE.
OpenSSL 1.1.0
OpenSSL License
==================================================================
Copyright (c) 1998-2016 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and
the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgment: "This product includes software developed by the OpenSSL Project for use in the
OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote
products derived from this software without prior written permission. For written permission, please
contact [email protected].

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 11
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear
in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
(http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
====================================================================
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This
product includes software written by Tim Hudson (tjh@cryptsoft.com).
Original SSLeay License
-----------------------
Copyright (C) 1995-1998 Eric Young ([email protected])
All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are
aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA,
lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution
is covered by the same copyright terms except that the holder is Tim Hudson ([email protected]).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be
removed. If this package is used in a product, Eric Young should be given attribution as the author
of the parts of the library used. This can be in the form of a textual message at program startup or
in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgement:
"This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)"
The word 'cryptographic' can be left out if the routines from the library being used are not
cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from the apps directory
(application code) you must include an acknowledgement:
"This product includes software written by Tim Hudson (tjh@cryptsoft.com)"

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 12
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code
cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence
[including the GNU Public Licence.]
Libwebsockets
v1.3-chrome37-
firefox30
Copyright (C) 2010-2014 Andy Green an[email protected]
Libwebsockets and included programs are provided under the terms of the GNU Library General
Public License (LGPL) 2.1 (available in Appendix A), with the following exceptions:
1) Static linking of programs with the libwebsockets library does not constitute a derivative work and
does not require the author to provide source code for the program, use the shared libwebsockets
libraries, or link their program against a user-supplied version of libwebsockets.
If you link the program to a modified version of libwebsockets, then the changes to libwebsockets
must be provided under the terms of the LGPL in sections 1, 2, and 4.
2) You do not have to provide a copy of the libwebsockets license with programs that are linked to
the libwebsockets library, nor do you have to identify the libwebsockets license in your program or
documentation as required by section 6 of the LGPL.
However, programs must still identify their use of libwebsockets. The following example statement
can be included in user documentation to satisfy this requirement:
"[program] is based in part on the work of the libwebsockets project (http://libwebsockets.org)"
Jansson 2.11
Copyright (c) 2009-2016 Petri Lehtinen <petri@digip.org>
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and
associated documentation files (the "Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is furnished to do so, subject
to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial
portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
OTHER DEALINGS IN THE SOFTWARE.
Zlib 1.2.11
(C) 1995-2017 Jean-loup Gailly and Mark Adler

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 13
This software is provided 'as-is', without any express or implied warranty. In no event will the authors
be held liable for any damages arising from the use of this software.
Permission is granted to anyone to use this software for any purpose, including commercial
applications, and to alter it and redistribute it freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you wrote the
original software. If you use this software in a product, an acknowledgment in the product
documentation would be appreciated but is not required.
2. Altered source versions must be plainly marked as such and must not be misrepresented as
being the original software.
3. This notice may not be removed or altered from any source distribution.
Jean-loup Gailly Mark Adler
[email protected] madler@alumni.caltech.edu
If you use the zlib library in a product, we would appreciate *not* receiving lengthy legal documents
to sign. The sources are provided for free but without warranty of any kind. The library has been
entirely written by Jean-loup Gailly and Mark Adler; it does not include third-party code.
If you redistribute modified sources, we would appreciate that you include in the file ChangeLog
history information documenting your changes. Please read the FAQ for more information on the
distribution of modified source versions.
OpenSSL 0.9.8i
OpenSSL 0.9.8i
Copyright (c) 1998-2008 The OpenSSL Project
Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
All rights reserved.
OpenSSL License
====================================================================
Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and
the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgment: "This product includes software developed by the OpenSSL Project for use in the
OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote
products derived from this software without prior written permission. For written permission, please
contact [email protected].
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear
in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
(http://www.openssl.org/)"

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 14
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
====================================================================
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This
product includes software written by Tim Hudson (tjh@cryptsoft.com).
Original SSLeay License
-----------------------
Copyright (C) 1995-1998 Eric Young ([email protected])
All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are
aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA,
lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution
is covered by the same copyright terms except that the holder is Tim Hudson ([email protected]).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be
removed. If this package is used in a product, Eric Young should be given attribution as the author
of the parts of the library used. This can be in the form of a textual message at program startup or
in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgement:
"This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)"
The word 'cryptographic' can be left out if the routines from the library being used are not
cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from the apps directory
(application code) you must include an acknowledgement:
"This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 15
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code
cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence
[including the GNU Public Licence.]
Open SSH 5.1
1)
Copyright (c) 1995 Tatu Ylonen <y[email protected]>, Espoo, Finland
All rights reserved
As far as I am concerned, the code I have written for this software can be used freely for any
purpose. Any derived versions of this software must be clearly marked as such, and if the derived
work is incompatible with the protocol description in the RFC file, it must be called by a name other
than "ssh" or "Secure Shell".
However, I am not implying to give any licenses to any patents or copyrights held by third parties,
and the software includes parts that are not under my direct control. As far as I know, all included
source code is used in accordance with the relevant license agreements and can be used freely for
any purpose (the GNU license being the most restrictive); see below for details.
[However, none of that term is relevant at this point in time. All of these restrictively licenced
software components which he talks about have been removed from OpenSSH, i.e.,
- RSA is no longer included, found in the OpenSSL library
- IDEA is no longer included, its use is deprecated
- DES is now external, in the OpenSSL library
- GMP is no longer used, and instead we call BN code from OpenSSL
- Zlib is now external, in a library
- The make-ssh-known-hosts script is no longer included
- TSS has been removed
- MD5 is now external, in the OpenSSL library
- RC4 support has been replaced with ARC4 support from OpenSSL
- Blowfish is now external, in the OpenSSL library]
Note that any information and cryptographic algorithms used in this software are publicly available
on the Internet and at any major bookstore, scientific library, and patent office worldwide. More
information can be found e.g. at "http://www.cs.hut.fi/crypto".
The legal status of this program is some combination of all these permissions and restrictions. Use
only at your own responsibility. You will be responsible for any legal consequences yourself; I am
not making any claims whether possessing or using this is legal or not in your country, and I am not
taking any responsibility on your behalf.
NO WARRANTY
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR
THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO
THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
REPAIR OR CORRECTION.

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 16
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES
ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT
LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES
SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE
WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
2)
The 32-bit CRC compensation attack detector in deattack.c was contributed by CORE SDI S.A.
under a BSD-style license.
Cryptographic attack detector for ssh - source code
Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina.
All rights reserved. Redistribution and use in source and binary forms, with or without modification,
are permitted provided that this copyright notice is retained.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES ARE
DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES RESULTING FROM
THE USE OR MISUSE OF THIS SOFTWARE.
Ariel Futoransky <futo@core-sdi.com>
<http://www.core-sdi.com>
3)
ssh-keyscan was contributed by David Mazieres under a BSD-style license.
Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
Modification and redistribution in source and binary forms is permitted provided that due credit is
given to the author and the OpenBSD project by leaving this copyright notice intact.
4)
The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers and Paulo Barreto is in the
public domain and distributed with the following license:
@version 3.0 (December 2000)
Optimised ANSI C code for the Rijndael cipher (now AES)
@author Vincent Rijmen <vincent.rijm[email protected]>
@author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
@author Paulo Barreto <paul[email protected]>
This code is hereby placed in the public domain.
THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 17
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
5)
One component of the ssh source code is under a 3-clause BSD license, held by the University of
California, since we pulled these parts from original Berkeley code.
Copyright (c) 1983, 1990, 1992, 1993, 1995
The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and
the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
6)
Remaining components of the software are provided under a standard 2-term BSD licence with the
following names as copyright holders:
Markus Friedl
Theo de Raadt
Niels Provos
Dug Song
Aaron Campbell
Damien Miller
Kevin Steves
Daniel Kouril
Wesley Griffin
Per Allansson
Nils Nordman
Simon Wilkinson
Portable OpenSSH additionally includes code from the following copyright holders, also under the
2-term BSD license:
Ben Lindstrom
Tim Rice
Andre Lucas

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 18
Chris Adams
Corinna Vinschen
Cray Inc.
Denis Parker
Gert Doering
Jakob Schlyter
Jason Downs
Juha Yrjölä
Michael Stone
Networks Associates Technology, Inc.
Solar Designer
Todd C. Miller
Wayne Schroeder
William Jones
Darren Tucker
Sun Microsystems
The SCO Group
Daniel Walsh
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and
the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
8) Portable OpenSSH contains the following additional licenses:
a) md5crypt.c, md5crypt.h
"THE BEER-WARE LICENSE" (Revision 42):
<[email protected]> wrote this file. As long as you retain this notice you can do whatever you
want with this stuff. If we meet some day, and you think this stuff is worth it, you can buy me a beer
in return. Poul-Henning Kamp
b) snprintf replacement
Copyright Patrick Powell 1995
This code is based on code written by Patrick Powell (papowell@astart.com) It may be used for any
purpose as long as this notice remains intact on all source code distributions
c) Compatibility code (openbsd-compat)

cnMatrix EX1K Basic Configuration Guide
Copyright2021CambiumNetworks.Allrightsreserved.(v1.2) 19
Apart from the previously mentioned licenses, various pieces of code in the openbsd-compat/
subdirectory are licensed as follows:
Some code is licensed under a 3-term BSD license, to the following copyright holders:
Todd C. Miller
Theo de Raadt
Damien Miller
Eric P. Allman
The Regents of the University of California
Constantin S. Svintsoff
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and
the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Some code is licensed under an ISC-style license, to the following copyright holders:
Internet Software Consortium.
Todd C. Miller
Reyk Floeter
Chad Mynhier
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is
hereby granted, provided that the above copyright notice and this permission notice appear in all
copies.
THE SOFTWARE IS PROVIDED "AS IS" AND TODD C. MILLER DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL TODD C. MILLER BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR
IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Some code is licensed under a MIT-style license to the following copyright holders:
Free Software Foundation, Inc.
Table of contents
Other Cambium Networks Switch manuals
Popular Switch manuals by other brands

Siemens
Siemens SIMATIC NET RUGGEDCOM MX5000 Equipment manual

Compaq
Compaq StorageWorks Fibre Channel SAN Switch 2 installation guide

Moxa Technologies
Moxa Technologies PT-7528 Hardware installation guide

Gefen
Gefen EXT-VGA-142N user manual

HP
HP H3C S9500 Configuration

Cisco
Cisco UCS 6100 Series Spec sheet