Configuration Options

 

Table 3

Cable Access Router Initialization Sequences and Events (continued)

 

 

 

 

 

Sequence

Event

Description

 

 

 

 

9

Comply with baseline privacy.

If baseline privacy is configured and enabled on both the

 

 

 

router and CMTS, the router and CMTS negotiate the

 

 

 

appropriate encryption/decryption parameters and exchange

 

 

 

keys for privacy. After encryption is enabled, all information

 

 

 

sent within Ethernet packets is encrypted to prevent

 

 

 

interception or modification by an unauthorized party.

 

 

 

 

10

Enter the operational maintenance

As soon as the Cisco uBR900 series cable access router has

 

 

state.

successfully completed the above sequence, it enters

 

 

 

operational maintenance state.

 

 

 

 

At this point the router is online and operational in the basic DOCSIS bridging (“plug and play”) mode. If the DOCSIS configuration file specifies that the router must download a Cisco IOS image and a Cisco IOS configuration file, the router uses TFTP to download the image and configuration file into its local memory. It then installs the new IOS image and runs the configuration file.

Downloading a DOCSIS configuration file to a Cisco uBR900 series cable access router automatically:

ends all telnet sessions

disables the cable access router’s console port, preventing local access to the router’s CLI

performs a “write erase” on the cable access router’s local configuration parameters

Telnet access to the router from the headend is still allowed, but only if the Cisco IOS configuration file includes enable and line vty passwords; if the configuration file does not include enable and line vty commands to specify these passwords, Telnet access and console access are both disabled.

Configuring the Cisco uBR900 Series Cable Access Routers 21

Page 21
Image 21
Cisco Systems UBR900 specifications Configuration Options