Configuring
Table 40 Cable Access Router Initialization Sequences and Events (continued)
Sequence | Event | Description |
| |||
|
|
|
|
| ||
7. | Transfer operational |
| Using TFTP, the router downloads the specified |
| ||
| parameters. |
| DOCSIS configuration file and configures itself for the |
| ||
|
|
| appropriate parameters. The DOCSIS configuration |
| ||
|
|
| file defines the router operating mode such as the |
| ||
|
|
| provisioned downstream and upstream service |
| ||
|
|
| assignments, including assigned frequencies, data |
| ||
|
|
| rates, modulation schemes, CoS, type of services to |
| ||
|
|
| support, and other parameters. Cisco provides tools to |
| ||
|
|
| help automate the creation of configuration files. |
| ||
|
|
|
|
|
|
|
|
|
| Note | The DOCSIS configuration file must be in the |
| |
|
|
|
|
| exact format given by the DOCSIS |
|
|
|
|
|
| specification. An incorrect DOCSIS |
|
|
|
|
|
| configuration file can cause the Cisco uBR900 |
|
|
|
|
|
| series to constantly cycle offline. Such errors |
|
|
|
|
|
| include wrong downstream frequency, wrong |
|
|
|
|
|
| UCD, wrong downstream channel ID, invalid |
|
|
|
|
|
| CoS, incorrect BPI privacy configurations or |
|
|
|
|
|
| shared secret strings. |
|
|
|
|
|
|
| |
|
|
| The cable access router sends another registration |
| ||
|
|
| request to the CMTS containing the CoS parameters |
| ||
|
|
| given in the DOCSIS configuration file. |
| ||
|
|
| The CMTS verifies that the router is using the |
| ||
|
|
| appropriate CoS profile and converts the temporary |
| ||
|
|
| SID into a data SID with a service class index that |
| ||
|
|
| points to the applicable CoS profile. |
| ||
|
|
|
|
| ||
8. | Perform registration. |
| The router completes its secondary ranging and is then |
| ||
|
|
| online, passing data between the HFC network and the |
| ||
|
|
| PCs and other CPE devices that are connected to the |
| ||
|
|
| router. |
|
| |
|
|
|
| |||
9. | Comply with baseline privacy. | If baseline privacy is configured and enabled on both |
| |||
|
|
| the router and CMTS, the router and CMTS negotiate |
| ||
|
|
| the appropriate encryption/decryption parameters and |
| ||
|
|
| exchange keys for privacy. After encryption is enabled, |
| ||
|
|
| all information sent within Ethernet packets is |
| ||
|
|
| encrypted to prevent interception or modification by an |
| ||
|
|
| unauthorized party. |
| ||
|
|
|
|
| ||
10. | Enter the operational |
| As soon as the Cisco uBR900 series cable access |
| ||
| maintenance state. |
| router has successfully completed the above sequence, |
| ||
|
|
| it enters operational maintenance state. |
| ||
|
|
|
|
|
|
|
At this point the router is online and operational in the basic DOCSIS bridging
Cisco IOS Multiservice Applications Configuration Guide