|
|
This chapter provides a basic understanding of the Cisco uBR905 cable access router's software feature sets, as well as the processes used for provisioning the router within a cable network and configuring it for different services. This chapter contains the following sections:
![]() |
Note This manual describes the Cisco uBR905 cable access router and feature sets as they exist in Cisco IOS Release 12.1(3)XL. |
The Cisco uBR905 cable access router supports a number of feature sets. Each feature set contains features that provide a specific functionality, such as firewall or advanced encryption. All feature sets, however, support base IP bridging as required by the Data-Over-Cable Service Interface Specification (DOCSIS). This allows the Cisco uBR905 cable access router to transmit data traffic over the HFC cable network.
The Cisco uBR905 supports the following Cisco IOS Release 12.1 images:
The following sections describe the feature sets in each of these categories. Descriptions of the features themselves are in the section "Feature Descriptions" section.
![]() |
Note Not all Cisco IOS software releases and images support all features. In particular, early deployment (ED) releases might contain a limited number of images that support a subset of feature sets and images. ED releases might also support images and feature sets that are not listed heresee the Release notes for each release for complete details on images and feature support. |
The Base IP Bridging feature set includes DOCSIS-compliant IP bridging and DOCSIS Baseline Privacy Interface (BPI) encryption. This allows the router to function as a DOCSIS 1.0 cable modem that can interoperate with any DOCSIS-qualified Cable Modem Termination System (CMTS). It provides basic high-speed Internet connectivity for customers who want to connect a small number of computers to the cable network.
This feature set also supports DOCSIS Baseline Privacy Interface (BPI) encryption, which provides 40-bit or 56-bit encryption of all Ethernet packets sent between the Cisco uBR905 cable access router and the CMTS. BPI encryption provides a basic level of security for all information sent by CPE devices over the cable interface.
DOCSIS-compliant bridging (also referred to as "plug-and-play" bridging) is available in all images for the Cisco uBR905 router and is the router's default configuration. In this mode, the router automatically does the following at power-on and system reset:
![]() |
Note The Base IP Bridging feature set is not available as a separate image because its feature set is incorporated in all other available images for the Cisco uBR905 cable access router. |
In DOCSIS-compliant bridging mode, the Cisco uBR905 cable access router acts as a transparent IP bridge for one or more customer premises equipment (CPE) devices. In this mode, it supports a maximum number of 254 CPE devices.
![]() |
Note The maximum number of CPE devices also depends on the value of the "MAX CPE" field in the DOCSIS configuration file. The MAX CPE field defaults to one CPE device unless set otherwise. In this situation, the Cisco uBR905 router can connect only one computer to the cable network, regardless of the Cisco IOS Release being used. |
In addition to full DOCSIS 1.0 support (see Base IP DOCSIS-Compliant Bridging), the Value Telecommuter feature set provides the following features:
The Value Telecommuter features allow employees to establish secure high-speed Internet connections between the employees' homes and the business' local area network (LAN).
The Performance Telecommuter feature set includes all the features found in the Value Telecommuter image, but adds 168-bit IPSec Triple Data Encryption Standard (3DES) encryption. The advanced IPSec encryption provides a higher-level of security to protect very sensitive information, such as medical and banking records.
The Value Small and Branch Office feature set adds the Cisco Secure Integrated Software firewall feature to the DOCSIS 1.0 support, Easy IP, and 56-bit IPSec encryption feature sets, providing a wide range of security features for the Cisco uBR905 router. The Cisco uBR905 router uses the firewall capability to protect the computers in the local office network from threats such as denial of service attacks and destructive Java applets. The router can also provide real-time alerts of such attacks.
The Performance Small and Branch Office feature set includes all the features found in the Value Small and Branch Office image, but adds 168-bit IPSec Triple Data Encryption Standard (3DES) encryption. This feature set allows employees who work with very sensitive information, such as medical and banking records, to work at home or a remote branch office, without compromising the integrity of the data that is transmitted over the network.
This section describes the particular features that are contained in the feature sets supported by the Cisco uBR905 cable access router. See the Release Notes for any particular release for information on which features are contained in a particular Cisco IOS image.
The Cable Monitor is a web-based diagnostic tool to display the current status and configuration of the Cisco uBR905 router. The Cable Monitor can also be used when the cable network is down, providing an easy way for subscribers to provide necessary information to service technicians and troubleshooters.
The Cable Monitor is introduced in Cisco IOS Release 12.1(3)XL and is described in detail in "Using the Cable Monitor Tool."
The Cisco IOS Firewall feature set provides firewall-specific security features to the Cisco uBR905 router. When this feature is enabled, the Cisco uBR905 router acts as a buffer between the Internet and other public networks and the private network that is connected to the Cisco uBR905 router. Security is provided by access lists, as well as by examining incoming traffic for suspicious activity.
The firewall-specific security features include the following:
This feature is introduced in Cisco IOS Release 12.1(3)XL.
![]() |
Note For general information about these features, see the description of the Cisco IOS Firewall Feature Set in the Cisco Product Catalog . For detailed information, see the Cisco IOS F irewall Feature Set documentation set, as well as the sections on Traffic Filtering and Firewalls in the Cisco IOS Security Configuration Guide and Cisco IOS Security Command Reference (available on the Documentation CD-ROM and CCO). |
DOCSIS-compliant bridging allows the Cisco uBR905 cable access router to operate as a DOCSIS 1.0 cable modem, so that it can interoperate with any DOCSIS-qualified CMTS. This is the default mode of operation for the Cisco uBR905 router.
This feature is introduced in Cisco IOS Software Release 12.1(3)XL.
The DOCSIS Baseline Privacy Interface (BPI) feature is based on the DOCSIS BPI Specification (SP-BPI-I02-990319 or later revision). It provides data privacy across the Hybrid Fiber-Coaxial (HFC) network by encrypting traffic flows between the Cisco uBR905 router and the cable operator's CMTS.
This feature is introduced in Cisco IOS Software Release 12.1(3)XL.
The DHCP server on the Cisco uBR905 router includes both Intelligent DHCP Relay and DHCP Client functionality. A DHCP Relay Agent is any host that forwards DHCP packets between clients and serversthis enables the client and server to reside on separate subnets. If the Cisco IOS DHCP server cannot satisfy a DHCP request from its own database, it can forward the DHCP request to one or more secondary DHCP servers defined by the network administrator.
This feature is introduced in Cisco IOS Software Release 12.1(3)XL.
The DHCP Proxy Support feature is useful in two situations:
When configured for DHCP Proxy Support, during startup the Cisco uBR905 cable access router sends a proxy DHCP request to the DHCP server using the Ethernet interface's MAC address. The DHCP server replies with a second IP address that the router assigns to either the Ethernet interface or to the NAT pool, depending on which option was specified.
This feature is introduced in Cisco IOS Release 12.1(3)XL and is described in detail in "New and Changed Commands Reference."
The Cisco uBR905 cable access router can transparently bridge IP traffic between its cable interface and its four RJ-45 hub ports with 10BaseT Ethernet connectivity. Up to four computers can be directly connected to these hub ports. Additional computers can be connected to the Cisco uBR905 router by connecting an Ethernet hub to one of the router's four ports; the hub, in turn, can be connected to additional computers or devices at the site.
A maximum of 254 devices can be bridged in bridging mode, but no limit exists when the Cisco uBR905 cable access router is operating in routing mode.
This feature is introduced in Cisco IOS Software Release 12.1(3)XL.
![]() |
Note The maximum number of CPE devices also depends on the value of the "MAX CPE" field in the DOCSIS configuration file. The MAX CPE field defaults to one CPE device unless otherwise set. In this situation, the Cisco uBR905 router can connect only one computer to the cable network, regardless of the Cisco IOS Release being used. |
IPSec network security provides robust authentications and encryption of IP packets. IPSec is a framework of open standards developed by the Internet Engineering Task Force (IETF) for the secure transmission of sensitive information over unprotected networks such as the Internet. IPSec acts at the network layer (Layer 3), protecting and authenticating IP packets between participating IPSec devices (peers) such as the Cisco uBR905 cable access router.
Unlike BPI encryption, which protects traffic only on the cable interface between the cable modem and CMTS, IPSec encryption provides end-to-end protection across open networks such as the Internet. Two levels of encryption56-bit and 168-bitare available, depending on the software image being used.
By default, the Cisco uBR905 cable access router uses its onboard hardware accelerator for all IPsec encryption and decryption. This offers greatly increased performance over software-based encryption techniques.
This feature is introduced in Cisco IOS Software Release 12.1(3)XL.
![]() |
Note Cisco IOS images with strong encryption (including, but not limited to, 168-bit [3DES] data encryption feature sets) are subject to United States government export controls and have limited distribution. Strong encryption images to be installed outside the United States may require an export license. Customer orders may be denied or subject to delay due to United States government regulations. When applicable, the purchaser or user must obtain local import and use authorizations for all encryption strengths. Contact your sales representative or distributor for more information, or send an e-mail to export@cisco.com. |
Layer 2 Tunneling Protocol (L2TP) is an IETF standard that combines the best features of two existing tunneling protocols: Cisco Layer 2 Forwarding (L2F) and Microsoft Point-to-Point Tunneling Protocol (PPTP). L2TP extends the Point-to-Point Protocol (PPP) to provide a secure connection across an open network and is an important component for virtual private networks (VPNs).
This feature is introduced in Cisco IOS Software Release 12.1(3)XL.
![]() |
Note The Cisco uBR905 cable access router does not support GRE IP tunnels. |
The Cisco uBR905 router supports NetRanger, which is an Intrusion Detection System (IDS) composed of three parts:
This feature is introduced in Cisco IOS Software Release 12.1(3)XL.
Network address translation (NAT) and port address translation (PAT) frees a private network from the requirement of having a worldwide unique IP address for every computer connected to the Internet. Instead, the Cisco uBR905 router translates the IP addresses used on the private network into a global IP address that can be used on the Internet. One IP address can be used for multiple computers because the Cisco uBR905 router uses a unique port address to identify individual computers on the private network.
This feature is introduced in Cisco IOS Software Release 12.1(3)XL.
Quality of service (QoS) is a set of features that identify different types of traffic on a network, so that certain types of traffic can be given higher priority than other types of traffic that have only a "best effort" attempt at delivery. This feature is especially important for real-time traffic, such as voice traffic, where delays would have a serious impact on traffic usefulness.
Depending on the software image used, the Cisco uBR905 cable access router supports the following QoS features:
This feature is introduced in Cisco IOS Software Release 12.1(3)XL.
In addition to the other QoS features, DOCSIS 1.1 supports a number of features that are required for the delivery of high quality voice traffic. To use these features before the DOCSIS 1.1 specification is finalized, Cisco has created the DOCSIS 1.0+ extensions that contain the most important of these features.
This feature is introduced in Cisco IOS Software Release 12.1(3)XL.
![]() |
Note Both the Cisco uBR905 cable access router and the CMTS router must support the dynamic multi-SID and concatenation features in order for them to be used on the cable network. If you are using the Cisco uBR7200 series universal broadband router as the CMTS, Cisco IOS Release 12.0(7)XR, Cisco IOS Release 12.1(1)T, or later is required on both the Cisco uBR905 and Cisco uBR7200 series routers to use these features. |
When configured for routing mode, the Cisco uBR905 cable access router defaults to using the Routing Information Protocol Version 2 (RIPv2). In routing mode the Cisco uBR905 router automatically configures itself to use the headend's IP address as its IP default gateway. This allows the Cisco uBR905 router to send packets not intended for the Ethernet interface to the headend.
RIPv2 routing is useful for small internetworks because it optimizes Network Interface Center (NIC)-assigned IP addresses by defining Variable-Length Subnet Masks (VLSMs) for network addresses, and it allows Classless Interdomain Routing (CIDR) addressing schema.
This feature is introduced in Cisco IOS Software Release 12.1(3)XL.
![]() |
Note The Cisco uBR905 cable access router supports only static routes and the RIPv2 routing protocol. |
The Cisco uBR905 router supports the Secure Shell (SSH) Version 1 protocol, which allows network administrators to make a secure Telnet connection with the router. SSH provides for authentication and encryption at the application layer, providing a secure connection even when BPI or IPSec authentication and encryption are not used at the network layer. The Cisco uBR905 router can function as both an SSH server and an SSH client.
By default, the SSH feature uses 56-bit DES encryption. Higher security 168-bit 3DES encryption is available when using Cisco IOS images that support 3DES IPSec encryption. (The SSH client must also support the same level of encryption.)
This feature is introduced in Cisco IOS Release 12.1(3)XL and is documented in the Secure Shell Version 1 Support feature module, available on CCO and the documentation CD-ROM.
The Data Encryption Standard (DES) is a standard cryptographic algorithm developed by the United States National Bureau of Standards. The Triple DES (3DES) standard increases the security from the standard 56-bit IPSec encryption to 168-bit encryption, providing a level of security that is suitable for highly sensitive and confidential information such as financial transactions and medical records.
This feature is introduced in Cisco IOS Release 12.1(3)XL.
![]() |
Note Cisco IOS images with strong encryption (including, but not limited to, 168-bit [3DES] data encryption feature sets) are subject to United States government export controls and have limited distribution. Strong encryption images to be installed outside the United States may require an export license. Customer orders may be denied or subject to delay due to United States government regulations. When applicable, the purchaser or user must obtain local import and use authorizations for all encryption strengths. Contact your sales representative or distributor for more information, or send an e-mail to export@cisco.com. |
![]() |
Note The Cisco uBR905 cable access router does not support GRE IP tunnels. |
The crypto dynamic-map command is part of the Cisco Secure PIX firewall and IPSec network security feature. The crypto dynamic-map command creates dynamic crypto maps, which are policy templates used when processing negotiation requests for new security associations from a remote IPSec peer. This allows you to negotiate a session even if you do not know all of the remote peer's crypto map parameters (such as the peer's IP address). In particular, this command allows you to accept requests for new security associations from previously unknown peers, while still requiring the peer to complete the proper ISAKMP (IKE) authentication.
When the firewall receives an IKE negotiation request from another IPSec peer, the request is examined to see if it matches a crypto map entry. If the negotiation does not match any explicit crypto map entry, it will be rejected unless the crypto map set includes a reference to a dynamic crypto map.
If the firewall accepts the peer's request, the firewall installs a temporary crypto map entry when it installs the new IPSec security associations. This entry is filled in with the results of the negotiation. At this point, the firewall performs normal processing, using this temporary crypto map entry as a normal entry, and requests new security associations if the current ones are expiring (based on the policy specified in the temporary crypto map entry). After all the corresponding security associations expire, the temporary crypto map entry is removed.
The crypto dynamic-map global configuration command supports several options, but the only required option is transform-set. The other parameters depend on the needs of your network.
This feature is introduced in Cisco IOS Release 12.1(3)XL.
![]() |
Note Dynamic crypto map sets are not used for initiating IPSec security associations. However, they are used for determining whether or not traffic should be protected. |
The Cisco uBR905 cable access router typically ships from the Cisco factory ready to work in the Base IP DOCSIS-Compliant Bridging data-only mode. However, before the router can transmit either data or voice traffic, the CMTS at the headend must properly provision the router as follows:
![]() |
Note The CMTS typically downloads the DOCSIS configuration file, Cisco IOS image (if needed), and Cisco IOS configuration file (if needed) only when the router is initially brought online. However, a new configuration file or image can be downloaded whenever necessary, such as when the cable service offers new services or when subscribers upgrade their services. |
To ensure that subscribers obtain the exact services they have ordered, the Cisco uBR905 cable access router arrives from the Cisco factory with a unique identifier (UID) that consists of a serial number and media access control (MAC) address. These factory-assigned values are on a label at the bottom of the router. For convenience, these values are also in a barcode label that can be scanned in for easy entry into the service provider's provisioning and billing system.
Using the MAC address of the router as the key, the CMTS downloads the DOCSIS configuration file and Cisco IOS image that will provide the services this particular subscriber has purchased. Service technicians at the headend typically create a number of standard configuration files to match the range of services offered by the provider. These configuration files can be created manually or with tools that Cisco Systems provides for this purpose.
![]() |
Note For a more detailed description of the provisioning process, see the Cisco uBR905 Cable Access Router Hardware Installation Guide, available on CCO and the Documentation CD-ROM. |
In data-only mode, the Cisco uBR905 cable access router typically uses only one class of service (CoS) profile that provides best-effort delivery of data traffic. However, certain types of traffic, such as real-time traffic, require multiple CoS profiles so that it can be given a higher priority than normal data traffic. This allows the traffic to be delivered in a timely manner by delaying transmission of data traffic in a way that does not degrade the overall quality of service (QoS).
In a DOCSIS 1.0 network, the multiple CoS profiles must be created at the time the Cisco uBR905 router is registered, using the CoS parameters in the DOCSIS configuration file. To support voice and other services in a DOCSIS 1.0 environment, the service provider typically specifies a primary CoS profile for best-effort data and secondary CoS profiles for higher-priority traffic.
The router requests the multiple profiles in a registration request message sent to the CMTS. In response, the CMTS assigns a Service Identifier (SID) for each CoS profile. The first SID assigned is the primary SID that is used for best-effort data traffic and handling the MAC and maintenance messages. The other SIDs are secondary SIDs used for the higher-priority traffic. These SID assignments remain in effect until the modem resets and reregisters itself using a different configuration.
When the Cisco uBR905 cable access router is running DOCSIS 1.0+ software, the router does not need to request additional SIDs at registration time. Instead, the router can send an Unsolicited Grant (UG) request to the CMTS, which responds by assigning a SID for the additional traffic flow. This dynamically-created SID is assigned a secondary CoS profile that matches the type of traffic being sent. When that traffic ends, its SID is deleted so the bandwidth can be used by another user.
In both DOCSIS 1.0 and 1.1 environments, the provider usually must create and maintain multiple CoS profiles. Typically, different CoS profiles are used for voice and fax traffic, as well as other forms of real-time traffic, because these services have different service requirements.
The provider could either assign the same CoS profiles for all users, or create a number of different CoS profiles that provide different levels of service, depending on the services purchased. The latter approach requires a method of associating a particular profile with specific users.
For this purpose, Cisco offers a set of software products for DOCSIS provisioning of different CoS profiles:
This set of software products can be used by the service provider deploying a subscriber provisioning system. The following sections describe each product in brief; for complete details, see the Cisco Subscriber Registration Center documentation set, available in the Network Management section of CCO and the customer documentation CD-ROM. Also see the Cisco Network Registrar for the Cisco uBR7200 Series documentation.
User Registrar (UR) provides a set of web pages and extensions that enable subscriber self-registration. UR addresses the needs of the following classes of users in the provisioning system implemented by the customer (typically a service provider):
UR includes the following features:
Modem Registrar (MR) provides dynamic generation of DOCSIS configuration files based on network and service policies. It builds DOCSIS configuration files for clients based on parameters stored in an LDAP directory. The customized DOCSIS configuration file is sent to the Cisco uBR905 cable access router using TFTP as part of the normal modem registration process.
MR includes the following features:
Cisco Network Registrar (CNR) supplies IP addresses and configuration parameters for DOCSIS cable modems and PCs based on user-defined network and service policies. CNR also allocates host names for these devices in DNS, and the related information is stored in an LDAP directory.
CNR assigns available IP addresses from address pools based on the identity or type of the requesting device and the policies in effect. For example, CNR can distinguish between registered devices, unregistered devices, and registered devices that have been assigned to a particular class of service.
Cisco Network Registrar includes the following features:
Access Registrar (AR) provides authorization and authentication services for DOCSIS-compliant modems that operate in a one-way cable plant requiring telco-return for upstream data. AR services can also provide dial-in data services for users who are roaming outside their cable service area. AR returns configuration parameters from RADIUS servers to NAS clients based on per-subscriber policies, which are obtained from an LDAP directory.
![]() |
Note AR does not apply to Cisco uBR905 cable access routers, which are two-way devices that do not require telco-return services. |
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Fri Sep 15 15:24:03 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.