cc/td/doc/product/cable/cab_modm/ubr924
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Overview

Overview

This chapter provides a basic understanding of the Cisco uBR924 cable access router's software feature sets, as well as the processes used for provisioning the router within a cable network and configuring it for different services. This chapter contains the following sections:


Note This manual describes the Cisco uBR924 cable access router and feature sets as they exist in Cisco IOS Release 12.1(3)T.

Cisco IOS Software Release Feature Sets

The Cisco uBR924 cable access router supports a number of feature sets. Each feature set contains features that provide a specific functionality, such as firewall or advanced encryption. All feature sets, however, support base IP bridging as required by the Data Over Cable Service Interface Specification (DOCSIS). This allows the Cisco uBR924 cable access router to transmit data traffic over the HFC cable network.

In addition to data traffic, the images for the Cisco uBR924 cable access router enable the voice ports, allowing the router to transmit Voice over IP (VoIP) and fax traffic over the cable network and Internet. Voice and data traffic can be transmitted simultaneously, but real-time traffic such as voice calls requires different handling than data traffic---data traffic can be sent on a "best-effort" basis because it can accept some loss or delay in the transmission of packets, but such losses and delays are unacceptable for voice calls.

For this reason, the Cisco uBR924 cable access router supports the DOCSIS Quality of Service (QoS) enhancements that give higher priority to IP packets containing voice traffic. This ensures that real-time traffic is delivered more reliably than "best-effort" data traffic.

The telephones and fax machines connected to the Cisco uBR924 router can route their calls over the Internet using either the H.323v2 (Gateway/Gatekeeper) or Simple Gateway Control Protocol (SGCP) voice control protocols. Depending on the protocol used and the level of support provided by the service provider, these calls can be made either to other VoIP devices or to phones connected on the regular telco network.

The following Cisco IOS Release 12.1 images support both data and voice traffic, in addition to the other feature sets that are listed:


Note Starting with Cisco IOS Release 12.1(1), the Cisco uBR924 cable access router supports fewer software images than previous releases (which supported 14 separate images). The new simplified set of software images are a superset of the images supported in the previous releases, allowing for an easy upgrade path from Release 12.0 to Release 12.1.

The following sections describe the feature sets in each of these categories. Descriptions of the features themselves are in the section "Feature Descriptions" section.


Note Not all Cisco IOS software releases and images support all features. In particular, early deployment (ED) releases might contain a limited number of images that support a subset of feature sets and images. ED releases might also support images and feature sets that are not listed here---see the Release notes for each Release for complete details on images and feature support.

Base IP DOCSIS-Compliant Bridging

The Base IP Bridging feature set includes DOCSIS-compliant bridging and DOCSIS Baseline Privacy Interface (BPI) encryption. This is the default feature set for the Cisco uBR924 cable access router in Cisco IOS Release 12.0 and allows the router to function as a DOCSIS 1.0 cable modem that can interoperate with any DOCSIS-qualified Cable Modem Termination System (CMTS). It provides basic high-speed Internet connectivity for customers who want to connect a small number of computers to the cable network.

DOCSIS-compliant bridging (also referred to as "plug-and-play" bridging) is the default configuration for the Cisco uBR924 router. In this mode, the router automatically does the following at power-on and system reset:


Note The Base IP Bridging feature set is the default image for the Cisco uBR924 cable access router in Cisco IOS Release 12.0. It is not available as a separate image in Cisco IOS Release 12.1 because is incorporated in all other available images.

In DOCSIS-compliant bridging mode, the Cisco uBR924 cable access router acts as a transparent bridge for one or more customer premises equipment (CPE) devices. The maximum number of CPE devices depends on the Cisco IOS Release being used:


Note The maximum number of CPE devices also depends on the value of the "MAX CPE" field in the DOCSIS configuration file. The MAX CPE field defaults to one CPE device unless set otherwise. In this situation, the Cisco uBR924 router can connect only one computer to the cable network, regardless of the Cisco IOS Release being used.

Home Office (Easy IP)

The Home Office feature set provides high-speed Internet connectivity for customers who have a small home network. In addition to full DOCSIS 1.0 support (see Base IP DOCSIS-Compliant Bridging), the Home Office feature set provides the Easy IP set of features that simplifies the administration of IP addresses in a cable network.

This feature set supports intelligent Dynamic Host Configuration Protocol Server (DHCP) functions, such as DHCP Relay Agent and DHCP Client functionality. It also supports Network Address Translation and Port Address Translation (NAT/PAT).

The DHCP features provide intelligence and flexibility in the handling and distribution of IP addresses for the PCs and other CPE devices being connected to the cable network. The NAT/PAT features allow the customer to use private IP addresses on the local network, while still maintaining connectivity to the Internet.

Value Telecommuter

In addition to full DOCSIS 1.0 support and the Home Office (Easy IP) feature set, the Value Telecommuter feature set supports 56-bit IPsec encryption and the Layer 2 Tunneling Protocol (L2TP). These additional features allow employees to establish secure high-speed Internet connections between the employees' homes and the business' local area network (LAN).

IPsec encryption provides robust authentication and encryption of IP packets so that sensitive information can be securely transmitted over unprotected networks such as the Internet. The standard 56-bit Data Encryption Standard (DES) encryption provides sufficient security for most applications.


Note IPsec encryption is in addition to BPI encryption. BPI encryption is done only on the traffic between the Cisco uBR924 router and the CMTS, not on traffic sent over the Internet. IPsec encryption, however, is end-to-end encryption, protecting traffic sent across the Internet from one host to another.

L2TP is an extension of the Point-to-Point Protocol (PPP) that allows computers on different physical networks to interoperate as if they were on the same local network. L2TP and IPsec encryption are often used to create virtual private networks (VPNs).


Note The Cisco uBR924 cable access router does not support the L2TP feature in Cisco IOS Release 12.1(3)T and later releases.

Performance Telecommuter

The Performance Telecommuter feature set includes all of the features found in the Value Telecommuter image, but adds 168-bit IPsec Triple Data Encryption Standard (3DES) encryption. The advanced IPsec encryption provides a higher-level of security to protect very sensitive information, such as medical and banking records.

Value Small and Branch Office

The Value Small and Branch Office feature set adds the Cisco Secure Integrated Software firewall feature to the DOCSIS 1.0 support, Home Office (Easy IP), and 56-bit IPsec encryption feature sets, providing a wide range of security features for the Cisco uBR924 router. The Cisco uBR924 router uses the firewall capability to protect the computers in the local office network from threats such as denial of service attacks and destructive Java applets. The router can also provide real-time alerts of such attacks.

IPsec encryption provides robust authentication and encryption of IP packets so that sensitive information can be securely transmitted over unprotected networks such as the Internet. The standard 56-bit Data Encryption Standard (DES) encryption provides sufficient security for most applications.


Note The Cisco uBR924 cable access router does not support the L2TP feature in Cisco IOS Release 12.1(3)T and later releases.

Performance Small and Branch Office

The Performance Small and Branch Office feature set includes all of the features found in the Value Small and Branch Office image, but adds 168-bit IPsec Triple Data Encryption Standard (3DES) encryption. The advanced IPsec encryption provides a higher-level of security to protect very sensitive information, such as medical and banking records.

Feature Descriptions

This section describes the particular features that are contained in the feature sets supported by the Cisco uBR924 cable access router. See the Release Notes for any particular release for information on which features are contained in a particular Cisco IOS image.

Cable Monitor Web Diagnostics Tool

The Cable Monitor is a web-based diagnostic tool to display the current status and configuration of the Cisco uBR924 router. The Cable Monitor can also be used when the cable network is down, providing an easy way for subscribers to provide necessary information to service technicians and troubleshooters.

The Cable Monitor is introduced in Cisco IOS Release 12.1(1)T and is described in detail in "Using the Cable Monitor Tool."

Cisco Cable Clock Card Support

The Cisco uBR924 router automatically supports the use of the Cisco Cable Clock Card on the Cisco uBR7246 VXR universal broadband router. The National Clock Card enables the Cisco uBR7246 VXR router to use a primary and secondary external clock derived from a Stratum 1 source. This provides a high quality clocking signal that minimizes jitter and other timing problems that can interfere with real-time traffic such as VoIP calls.

This feature is introduced in Cisco IOS Release 12.1(1)T.

Cisco Secure Integrated Software

The Cisco Secure Integrated Software feature set---previously known as the Cisco IOS Firewall feature set---provides firewall-specific security features to the Cisco uBR924 router. When this feature is enabled, the Cisco uBR924 router acts as a buffer between the Internet and other public networks and the private network that is connected to the Cisco uBR924 router. Security is provided by access lists, as well as by examining incoming traffic for suspicious activity.

The firewall-specific security features include the following:

This feature is introduced in Cisco IOS Release 12.0(5)T and is enhanced with additional capabilities in 12.0(7)T.


Note For general information about these features, see the description of the Cisco  IOS Firewall Feature Set in the Cisco Product Catalog. For detailed information, see the Cisco IOS F irewall Feature Set documentation set, as well as the sections on Traffic Filtering and Firewalls in the Security Configuration Guide and Security Command Reference (available on the Documentation CD-ROM and CCO).

DOCSIS-Compliant Bridging

DOCSIS-compliant bridging allows the Cisco uBR924 cable access router to operate as a DOCSIS 1.0 cable modem, so that it can interoperate with any DOCSIS-qualified CMTS. This is the default mode of operation for the Cisco uBR924 router.

This feature is introduced in Cisco IOS Software Release 12.0(4)XI1.

DOCSIS Baseline Privacy Interface

The DOCSIS Baseline Privacy Interface (BPI) feature is based on the DOCSIS BPI Specification (SP-BPI-I02-990319 or later revision). It provides data privacy across the Hybrid Fiber-Coaxial (HFC) network by encrypting traffic flows between the Cisco uBR924 router and the cable operator's CMTS.

This feature is introduced in Cisco IOS Software Release 12.0(5)T.

Dynamic Host Configuration Protocol Server

The DHCP server on the Cisco uBR924 router includes both Intelligent DHCP Relay and DHCP Client functionality. A DHCP Relay Agent is any host that forwards DHCP packets between clients and servers---this enables the client and server to reside on separate subnets. If the Cisco IOS DHCP server cannot satisfy a DHCP request from its own database, it can forward the DHCP request to one or more secondary DHCP servers defined by the network administrator.

This feature is introduced in Cisco IOS Release 12.0(4)XI.

Dynamic Host Configuration Protocol Proxy Support

The DHCP Proxy Support feature is useful in two situations:

When configured for DHCP Proxy Support, during startup the Cisco uBR924 cable access router sends a proxy DHCP request to the DHCP server using the Ethernet interface's MAC address. The DHCP server replies with a second IP address that the router assigns to either the Ethernet interface or to the NAT pool, depending on which option was specified.

This feature is introduced in Cisco IOS Release 12.1(1)T and is described in detail in "New and Changed Commands Reference."

Enhanced IP Bridging

The Cisco uBR924 cable access router can transparently bridge traffic between its cable interface and its four RJ-45 hub ports with 10BaseT Ethernet connectivity. Up to four computers can be directly connected to these hub ports. Additional computers can be connected to the Cisco uBR924 router by connecting an Ethernet hub to one of the router's four ports; the hub, in turn, can be connected to additional computers or devices at the site.

A maximum of 3 devices can be bridged using Cisco IOS Release 12.0(4)XI images. A maximum of 254 devices can be bridged using Cisco IOS Release 12.0(5)T or higher images. (No limit exists when the Cisco uBR924 cable access router is operating in routing mode.)

This feature is introduced in Cisco IOS Release 12.0(5)T.


Note The maximum number of CPE devices also depends on the value of the "MAX CPE" field in the DOCSIS configuration file. The MAX CPE field defaults to one CPE device unless set otherwise. In this situation, the Cisco uBR924 router can connect only one computer to the cable network, regardless of the Cisco IOS Release being used.

Ecosystem Gatekeeper Interoperability Enhancements

The Ecosystem Gatekeeper Interoperability Enhancements feature improves the ability of voice gateways to move between gatekeepers upon a failure or an outage. Currently, gateways can be configured to switch from their primary gatekeeper to an alternate gatekeeper if a failure or outage occurs.

However, moving gateways from one gatekeeper to another can create an imbalance in the number of gateways registered to each gatekeeper. The Ecosystem Gatekeeper Interoperability Enhancements feature helps to restore the balance by moving some of the gateways back to their proper gatekeepers after the outage has been corrected.

The Cisco uBR924 cable access router automatically supports this feature when acting as an H.323v2 voice gateway. This feature has been implemented in two phases:

Phase 1 of this feature is introduced in Cisco IOS Release 12.1(1)T. Phase 2 is introduced in Cisco IOS Release 12.1(2)T.


Note For more information on this feature, see the Ecosystem Gatekeeper Interoperability Enhancements, Phase 2 feature module, available on CCO and the Documentation CD-ROM.

Fax over IP

Fax over IP is a form of VoIP support that supports the unique characteristics of fax transmissions. When using a voice-enabled image, the two voice ports on the Cisco uBR924 router can be connected to either fax machines or voice telephones, allowing fax traffic to be sent as VoIP traffic.

This feature is introduced in Cisco IOS Software Release 12.0(5)T.

H.323v2 (Gateway/Gatekeeper)

The Cisco uBR924 cable access router can support VoIP traffic as an H.323v2 gateway. The H.323v2 protocol maps an IP address to an E.164 telephone number, allowing VoIP calls to terminate either on other VoIP devices or on devices in the regular telco network. The H.323v2 protocol uses a dial plan and mapper on a server located at the CMTS or elsewhere to perform this mapping, which can be done either statically or dynamically, depending on the version of Cisco IOS software being used.

For information about these features, see H.323 Version 2 Support , available on CCO at http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/120newft/120t/120t5.

Support for H.323 is introduced in Cisco IOS Release 12.0(4)XI1 and enhanced with support for H.323v2 in Cisco IOS Release 12.0(5)T. Additional H.323v2 features are added in Cisco IOS Release 12.1(1)T and Cisco IOS Release 12.1(2)T.

IP Address Negotiation

Cisco IOS Release 12.1(3)T for Cisco uBR900 series cable access routers adds support for the ip address dhcp command on the cable interface. Previous releases used the ip address negotiated command for this purpose, but this command is now reserved for serial interfaces.

IPsec Network Security

IPsec network security provides robust authentications and encryption of IP packets. IPsec is a framework of open standards developed by the Internet Engineering Task Force (IETF) for the secure transmission of sensitive information over unprotected networks such as the Internet. IPsec acts at the network layer (Layer 3), protecting and authenticating IP packets between participating IPsec devices ("peers") such as the Cisco uBR924 cable access router.

Unlike BPI encryption, which protects traffic only on the cable interface between the cable modem and CMTS, IPsec encryption provides end-to-end protection across open networks such as the Internet. Two levels of encryption---56-bit and 168-bit---are available, depending on the software image being used.

This feature is introduced in Cisco IOS Release 12.0(5)T.


Note Cisco IOS images with strong encryption (including, but not limited to, 168-bit [3DES] data encryption feature sets) are subject to United States government export controls and have limited distribution. Strong encryption images to be installed outside the United States may require an export license. Customer orders may be denied or subject to delay due to United States government regulations. When applicable, the purchaser or user must obtain local import and use authorizations for all encryption strengths. Contact your sales representative or distributor for more information, or send an e-mail to export@cisco.com.

Layer 2 Tunneling Protocol

Layer 2 Tunneling Protocol (L2TP) is an IETF standard that combines the best features of two existing tunneling protocols: Cisco's Layer 2 Forwarding (L2F) and Microsoft's Point-to-Point Tunneling Protocol (PPTP). L2TP extends the Point-to-Point Protocol (PPP) to provide a secure connection across an open network and is an important component for virtual private networks (VPNs).

This feature is introduced in Cisco IOS Release 12.0(5)T and is supported through Cisco IOS Release 12.1(2)T. L2TP is not supported in Cisco IOS Release 12.1(3)T or later images.


Note The Cisco uBR924 cable access router does not support GRE IP tunnels.

Media Gateway Control Protocol V12.1.3T

Cisco IOS Release 12.1(3)T for the Cisco uBR924 cable access router supports version 0.1 of the Media Gateway Control Protocol (MGCP), a proposed IETF voice control protocol that is intended to eventually supersede the existing SCGP 1.1 protocol. The MGCP 0.1 and SGCP 1.1 protocols have been merged on the Cisco uBR924 router so that the router can respond efficiently to either protocol.

The Cisco uBR924 cable access router functions as a Residential Gateway (RGW), providing an interface between analog FXS phone or fax systems and the Voice over IP (VoIP) network. The RGW uses a Trunking Gateway (TGW) to contact the call agent, which in turn provides access to the public telephone switched network (PTSN).

The Cisco uBR924 cable access router supports both call waiting and caller ID when using either MGCP or SGCP for call control. Each of the two voice ports on the Cisco uBR924 router can be configured with the IP address for a default call agent. SNMP management of both the MGCP and SNMP protocols is provided by a single MIB (XGCP-MIB).


Note This feature is described in detail in the Media Gateway Control Protocol Version 12.1.3T feature module, available on CCO and the Documentation CD-ROM.

NetRanger Support---Cisco IOS Intrusion Detection

The Cisco uBR924 router supports NetRanger, which is an Intrusion Detection System (IDS) composed of three parts:

This feature is introduced in Cisco IOS Release 12.0(7)T.

Network Address Translation and Port Address Translation

Network address translation (NAT) and port address translation (PAT) frees a private network from the requirement of having a worldwide unique IP address for every computer connected to the Internet. Instead, the Cisco uBR924 router translates the IP addresses used on the private network into a global IP address that can be used on the Internet. One IP address can be used for multiple computers because the Cisco uBR924 router uses a unique port address to identify individual computers on the private network.

This feature is introduced in Cisco IOS Release 12.0(4)XI1.

Quality of Service

Quality of service (QoS) is a set of features that identify different types of traffic on a network so that certain types of traffic can be given higher priority than other types of traffic that have only a "best effort" attempt at delivery. This feature is especially important for real-time traffic, such as voice traffic, where delays would have a serious impact on the traffic's usefulness.

Depending on the software image used, the Cisco uBR924 cable access router supports the following QoS features:

These features are introduced in Cisco IOS Release 12.0(7)T and enhanced in subsequent releases.

Quality of Service---DOCSIS 1.0+ Extensions

In addition to the other QoS features, DOCSIS 1.1 supports a number of features that are required for the delivery of high quality voice traffic. To use these features before the DOCSIS 1.1 specification is finalized, Cisco has created the DOCSIS 1.0+ extensions that contain the most important of these features.

To avoid potentially wasting bandwidth in this manner, the DOCSIS 1.0+ extensions support the dynamic creation of multiple SIDs. New MAC messages dynamically add, delete, and modify SIDs when needed. When a phone connected to the router is taken off-hook, the Cisco uBR924 router creates a SID that has the QoS parameters needed for that particular voice call. When the call terminates, the router deletes the SID, releasing its bandwidth for use elsewhere.

The DOCSIS 1.0+ features are introduced in Cisco IOS Software Release 12.0(7)XR and 12.1(1)T.


Note Both the Cisco uBR924 cable access router and the CMTS router must support the dynamic multi-SID and concatenation features for them to be used on the cable network. If you are using the Cisco uBR7200 series universal broadband router as the CMTS, Cisco IOS Release 12.0(7)XR, Release 12.1(1)T, or later is required on both the Cisco uBR924 and Cisco uBR7200 series routers to use these features.

Routing Information Protocol Version 2

When configured for routing mode, the Cisco uBR924 cable access router defaults to using the Routing Information Protocol Version 2 (RIPv2). In routing mode the Cisco uBR924 router automatically configures itself to use the headend's IP address as its IP default gateway. This allows the Cisco uBR924 router to send packets not intended for the Ethernet interface to the headend.

RIPv2 routing is useful for small internetworks because it optimizes Network Interface Center (NIC)-assigned IP addresses by defining Variable-Length Subnet Masks (VLSMs) for network addresses, and it allows Classless Interdomain Routing (CIDR) addressing schema.

This feature is introduced in Cisco IOS Release 12.0(4)XI1.


Note The Cisco uBR924 cable access router supports only static routes and the RIPv2 routing protocol.

Secure Shell Version 1

The Cisco uBR924 router supports the Secure Shell (SSH) Version 1 protocol, which allows network administrators to make a secure Telnet connection with the router. SSH provides for authentication and encryption at the application layer, providing a secure connection even when BPI or IPsec authentication and encryption are not used at the network layer.

By default, the SSH feature uses 56-bit DES encryption. Higher security 168-bit 3DES encryption is available when using Cisco IOS images that support 3DES IPsec encryption. (The SSH server and client must support the same level of encryption.)

SSH server support is introduced in Cisco IOS Release 12.1(1)T. SSH client support is introduced in Cisco IOS Release 12.1(3)T.


Note For configuration and other information, see the Secure Shell Version 1 Client feature module, available on CCO and the Documentation CD-ROM.

Simple Gateway Control Protocol

The Simple Gateway Control Protocol (SGCP) provides for control call setup and teardown for VoIP calls made through the Internet or a local Intranet. SGCP uses call control agents to communicate with the voice gateways, allowing customers to create a distributed system that enhances performance, reliability, and scalability while still appearing as a single VoIP gateway to external clients.

SGCP can preserve Signaling System 7 (SS7) style call control information, as well as additional network information, such as routing information and authentication, authorization, and accounting (AAA) security information. SGCP allows voice calls to be originate and terminate on the Internet, as well as allowing one end to terminate on the Internet and the other to terminate on a telephone or PBX on the Public Switched Telephone Network (PSTN).

The Cisco uBR924 cable access router functions as an SGCP residential gateway (RGW), not as the trunking gateway (TGW), which controls the telephone call.


Note The Cisco uBR924 router supports both H.323 and SGCP call control, but only one method can be active at a time.

This feature is introduced in Cisco IOS Release 12.0(5)T and enhanced in Release 12.0(7)T. In Cisco IOS Release 12.1(3)T, this feature is merged with the Media Gateway Control Protocol V12.1.3T feature, providing simultaneous support for both SGCP and MGCP.

Triple Data Encryption Standard

The Data Encryption Standard (DES) is a standard cryptographic algorithm developed by the United States National Bureau of Standards. The Triple DES (3DES) standard increases the security from the standard 56-bit IPsec encryption to 168-bit encryption, providing a level of security that is suitable for highly sensitive and confidential information such as financial transactions and medical records.

This feature is introduced in Cisco IOS Release 12.0(5)T.


Note Cisco IOS images with strong encryption (including, but not limited to, 168-bit [3DES] data encryption feature sets) are subject to United States government export controls and have limited distribution. Strong encryption images to be installed outside the United States may require an export license. Customer orders may be denied or subject to delay due to United States government regulations. When applicable, the purchaser or user must obtain local import and use authorizations for all encryption strengths. Contact your sales representative or distributor for more information, or send an e-mail to export@cisco.com.


Note The Cisco uBR924 cable access router does not support GRE IP tunnels.

VPN IPsec Enhancement---Dynamic Crypto Map

The crypto dynamic-map command is part of the Cisco  Secure PIX firewall and IPsec network security feature. The crypto dynamic-map command creates dynamic crypto maps, which are policy templates used when processing negotiation requests for new security associations from a remote IPsec peer. This allows you to negotiate a session even if you do not know all of the remote peer's crypto map parameters (such as the peer's IP address); in particular, this allows you to accept requests for new security associations from previously unknown peers, while still requiring the peer to complete the proper ISAKMP (IKE) authentication.

When the firewall receives a negotiation request via IKE from another IPsec peer, the request is examined to see if it matches a crypto map entry. If the negotiation does not match any explicit crypto map entry, it will be rejected unless the crypto map set includes a reference to a dynamic crypto map.

If the firewall accepts the peer's request, it installs a temporary crypto map entry when it installs the new IPsec security associations. This entry is filled in with the results of the negotiation. At this point, the firewall performs normal processing, using this temporary crypto map entry as a normal entry, and even requests new security associations if the current ones are expiring (based on the policy specified in the temporary crypto map entry). After all of the corresponding security associations expire, the temporary crypto map entry is removed.

The crypto dynamic-map global configuration command supports a number of options, but the only required option is the transform-set. The other parameters are optional, depending on the needs of your network.

This feature is introduced in Cisco IOS Release 12.0(7)T.


Note Dynamic crypto map sets are not used for initiating IPsec security associations. However, they are used for determining whether or not traffic should be protected.

Initial Provisioning

The Cisco uBR924 cable access router typically ships from the Cisco factory ready to work in the Base IP DOCSIS-Compliant Bridging data-only mode. However, before router can transmit either data or voice traffic, the CMTS at the headend must properly provision the router as follows:


Note The CMTS typically downloads the DOCSIS configuration file, Cisco IOS image (if needed), and Cisco IOS configuration file (if needed) only once when the router is initially brought online. However, a new configuration file or image can be downloaded whenever necessary, such as when the cable service offers new services or when subscribers upgrade their services.

To ensure that subscribers obtain the exact services they have ordered, the Cisco uBR924 cable access router arrives from the Cisco factory with a unique identifier (UID) that consists of a serial number and media access control (MAC) address. These factory-assigned values are on a label at the bottom of the router; for convenience, these values are also in a barcode label that can be scanned in for easy entry into the service provider's provisioning and billing system.

Using the MAC address of the router as the key, the CMTS downloads the DOCSIS configuration file and Cisco IOS image that will provide the services this particular subscriber has purchased. Service technicians at the headend typically create a number of standard configuration files to match the range of services offered by the provider; these configuration files can be created manually or with tools that Cisco Systems provides for this purpose.


Note For a more detailed description of the provisioning process, see the Cisco uBR924 Cable Access Router Hardware Installation Guide, available on CCO and the Documentation CD-ROM.

Supporting Multiple Classes of Service

In data-only mode, the Cisco uBR924 cable access router typically uses only one class of service (CoS) profile that provides for best-effort delivery of data traffic. In data and voice mode, however, multiple CoS profiles are required so that the real-time voice traffic can be given a higher priority than normal data traffic. This allows voice traffic to be delivered in a timely manner by delaying transmission of data traffic in a way that does not degrade the overall quality of service (QoS).

DOCSIS 1.0 Static Profiles

In a DOCSIS 1.0 network, the multiple CoS profiles must be created at the time the Cisco uBR924 router is registered, using the CoS parameters in the DOCSIS configuration file. To support voice services in a DOCSIS 1.0 environment, the service provider typically specifies a primary CoS profile for best-effort data and second CoS profiles for voice and fax traffic.

The router requests the multiple profiles in a registration request message sent to the CMTS. In response, the CMTS assigns a Service Identifier (SID) for each CoS profile. The first SID assigned is the primary SID that is used for best effort data traffic as well as for the handling of MAC and maintenance messages. The other SIDs are secondary SIDs used for voice and fax traffic. These SID assignments remain in effect until the modem resets and reregisters itself using a different configuration.

DOCSIS 1.0+ and 1.1 Dynamic Profiles

When the Cisco uBR924 cable access router is running DOCSIS 1.0+ software, the router does not need to request additional SIDs at registration time. Instead, the router specifies the number of phone lines connected to the router, using the Vendor Specific Information Field (VSIF) in the DOCSIS configuration file.

When one of the phones connected to the Cisco uBR924 router is taken off-hook, the router sends an Unsolicited Grant (UG) request to the CMTS, which responds by assigning a SID for that voice call. This dynamically-created SID is assigned a secondary CoS profile that matches the type of call being made (voice or fax). When the voice or fax call terminates, its SID is deleted so the bandwidth can be used by another user.

Creating Multiple Profiles

In both DOCSIS 1.0 and 1.1 environments, the provider must create and maintain multiple CoS profiles for voice and fax users. Typically, different CoS profiles are used for voice and fax traffic because these services use different codec algorithms that have different timing requirements.

The provider could assign the same CoS profiles for all voice and fax users, or the provider could create a number of different CoS profiles that provide different levels of service, depending on the number of voice lines and other services purchased. This latter approach requires a method of associating a particular profile with specific users.

For this purpose, Cisco offers a set of software products for DOCSIS provisioning of different CoS profiles:

This set of software products can be used by the service provider deploying a subscriber provisioning system. The following sections describe each product in brief; for complete details, see the Cisco  Subscriber Registration Center documentation set, available in the Network Management section of CCO and the customer documentation CD-ROM. Also see the Cisco  Network Registrar for the Cisco  uBR7200 Series documentation.

User Registrar

User Registrar (UR) provides a set of web pages and extensions that enable subscriber self-registration. User Registrar addresses the needs of three separate classes of users in the provisioning system implemented by the customer (typically a service provider). This software tool addresses the needs of the:

User Registrar includes the following features:

Modem Registrar

Modem Registrar (MR) provides dynamic generation of DOCSIS configuration files based on network and service policies. It builds DOCSIS configuration files for clients based on parameters stored in an LDAP directory. The customized DOCSIS configuration file is sent to the Cisco uBR924 cable access router using TFTP as part of the normal modem registration process.

Modem Registrar includes the following features:

Cisco Network Registrar

Cisco Network Registrar (CNR) supplies IP addresses and configuration parameters for DOCSIS cable modems and PCs based on user-defined network and service policies. CNR also allocates host names for these devices in DNS and the related information is stored in an LDAP directory.

CNR assigns available IP addresses from address pools based on the identity or type of the requesting device and the policies in effect. For example, CNR can distinguish between registered devices, unregistered devices, and registered devices that have been assigned to a particular class of service.

Key features of Cisco Network Registrar include:

Access Registrar

Access Registrar (AR) provides authorization and authentication services for DOCSIS-compliant modems that operate in a one-way cable plant requiring telco-return for upstream data. AR services can also provide dial-in data services for users who are roaming outside their cable service area. AR returns configuration parameters from RADIUS servers to NAS clients based on per-subscriber policies, which are obtained from an LDAP directory.


Note AR does not apply to Cisco uBR924 cable access routers, which are two-way devices that do not require telco-return services.

FastStep

FastStep is a Microsoft Windows-based software product that eases the setup of new and existing Cisco uBR924 cable access routers by automatically configuring them after the user has answered a few preset questions. The FastStep user is typically a technician at the subscriber's site or a system administrator for a small business or home office.

FastStep includes the following features:


hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Jul 20 18:47:39 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.