Basic Troubleshooting
Configuring the Cisco uBR900 Series Cable Access Routers 29
Note “Full security” was a request made by cable service providers for a very strong authorization
and authentication check by the CMTS. The Cisco uBR900 series supports DOCSIS baseline
privacy (Event 10), which protects your data from being “sniffed” on the cable network.
Event 8Transfer Operational Parameters
After completing the DHCP and security operations, the Cisco uBR900 series downloads
operational parameters by downloading a configuration file located on the TFTP server. The
CMAC_LOG_DHCP_CONFIG_FILE_NAME field shows the filename containing the transmission
parameters.
508177.164 CMAC_LOG_STATE_CHANGE configuration_file_state
508177.166 CMAC_LOG_LOADING_CONFIG_FILE platinum.cm
508178.280 CMAC_LOG_CONFIG_FILE_PROCESS_COMPLETE
Event 9Perform Registration
After the Cisco uBR900 series is initialized, authenticated, and configured, it requests to be
registered with the headend CMTS. The CMAC_LOG_COS_ASSIGNED_SID field assigns a class of
service (CoS) number and a service ID (SID). Multiple CoS entries in the configuration file imply
that multiple SIDs are supported by the cable access router. If several cable access routers use the
same configuration file, they will have the same CoS numbers but will be assigned different SIDs.
A successful registration is indicated by the CMAC_LOG_REGISTRATION_OK field.
508178.300 CMAC_LOG_STATE_CHANGE registration_state
508178.302 CMAC_LOG_REG_REQ_MSG_QUEUED
508178.306 CMAC_LOG_REG_REQ_TRANSMITTED
508178.310 CMAC_LOG_REG_RSP_MSG_RCVD
508178.312 CMAC_LOG_COS_ASSIGNED_SID 5/19
508178.314 CMAC_LOG_COS_ASSIGNED_SID 6/20
508178.316 CMAC_LOG_COS_ASSIGNED_SID 7/21
508178.318 CMAC_LOG_RNG_REQ_QUEUED 19
508178.320 CMAC_LOG_REGISTRATION_OK
Event 10Comply with Baseline Privacy
During this event, keys for baseline privacy are exchanged between the Cisco uBR900 series and the
headend CMTS. A link level encryption is performed so that your data cannot be “sniffed” by anyone
else on the cable network.
Following is a trace showing baseline privacy enabled. The key management protocol is responsible
for exchanging two types of keys: KEKs and TEKs. The KEK (key exchange key, also referred to as
the authorization key) is used by the CMTS to encrypt the TEKs (traffic encryption keys) it sends to
the Cisco uBR900 series. The TEKs are used to encrypt/decrypt the data. There is a TEK for each
SID that is configured to use privacy.