1-18
Cisco uBR10012 Universal Broadband Router Software Configuration Guide
OL-1520-08
Chapter1 Overview of CiscouBR10012 Universal Broadband Router Software
Supported Software Features for the CiscouBR10012 Router
DOCSIS 1.0 Feature Support
The Cisco uBR10012 router and associated Cisco IOS software support multiple DOCSIS 1.0
enhancements, extensions, and features.
DOCSIS 1.0 Baseline Privacy Interface
DOCSIS 1.0 Concatenation Override
DOCSIS 1.0 Configuration File Settings
DOCSIS 1.0 Constant Bit Rate Extension
DOCSIS 1.0 MAC Driver
DOCSIS 1.0 Quality of Service Support
DOCSIS 1.0 Payload Header Suppression
DOCSIS 1.0 per SID Bandwidth Request and Grant Counters
Enhanced Rate Bandwidth Allocation (ERBA) Support for DOCSIS 1.0 Cable Modems
For additional information about configuring DOCSIS QoS and other DOCSIS features, refer to the
DOCSIS 1.1 Feature Module for the Cisco uBR7200 Routers on Cisco.com, and to other documents cited
for DOCSIS 1.0 features below.
Caution All DOCSIS 1.0 extensions are activated only when a CM or equivalent device that supports these
extensions solicits services using dynamic MAC messages. If the CMs in your network are all
DOCSIS 1.0-based, they receive regular DOCSIS 1.0 treatment from the CMTS.

DOCSIS 1.0 Baseline Privacy Interface

The CiscouBR10012router supports full DOCSIS 1.0 Baseline Privacy Interface (BPI) specifications. The
BPI for DOCSIS 1.0 protects user data privacy across the shared-medium cable network and prevents
unauthorized access to DOCSIS-based data transport services across the cable network. BPI encrypts traffic
across the RF interface between the CM and CMTS, and includes authentication, authorization, and
accounting (AAA) features.
The level of data privacy is roughly equivalent to that provided by dedicated line network access services
such as analog modems or digital subscriber lines (DSL). BPI provides basic protection of service,
ensuring that a CM, uniquely identified by its MAC address, can obtain keying material for services only
when it is authorized to access them.
Note Encryption and decryption are subject to export licensing controls.
BPI supports access control lists (ACLs), tunnels, filtering, protection against spoofing, and commands
to configure source IP filtering on RF subnets to prevent subscribers from using source IP addresses that
are not valid.