cc/td/doc/product/software/ios121/121relnt
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Release Notes for Cisco uBR910 Series for Cisco IOS Release 12.1 T

Release Notes for Cisco uBR910 Series for Cisco IOS Release 12.1 T

July 24, 2000


Note   You can find the most current Cisco IOS documentation on Cisco Connection Online (CCO). These electronic documents may contain updates and modifications made after this document was published.

These release notes for the Cisco uBR910 series DSU describe the enhancements provided in Cisco IOS Release 12.1(3)T, which is an early deployment release based on 12.1 T. These release notes are updated as needed.

For a list of software caveats that apply to Release 12.1(3)T, see the "Caveats" section and the Caveats for Cisco IOS Release 12.1 T document. The caveats document is updated for every maintenance release and is located on Cisco Connection Online (CCO) and the Documentation CD-ROM.

Use these release notes with Cross-Platform Release Notes for Cisco IOS Release 12.1 T located on CCO and the Documentation CD-ROM.

Contents

These release notes describe the following topics:

Introduction

The Cisco uBR910 series DSU provides wide area network (WAN) connectivity for an existing local area network (LAN), but uses a cable broadband network instead of traditional telco-based WAN connectivity options such as a leased line. Connectivity to the Internet and other networks is made through a Cable Modem Termination System (CMTS), which is the cable system headend equipment that provides the data and voice services that have been purchased by subscribers.

The Cisco uBR910 series DSU connects to both the cable broadband network and to the access router that is serving as the gateway for the existing LAN. The access router continues to act as the gateway for the LAN, while the Cisco uBR910 series DSU sends the traffic between the access router and the cable network, performing the overhead required to maintain the data cable connection. This simplifies network administration and allows the access router to continue its current function with minimal configuration changes.

Description

The Cisco uBR910 series DSU is based on the Data-Over-Cable Service Interface Specification (DOCSIS) and interoperates with any bidirectional, DOCSIS-qualified CMTS. In its connection with the CMTS, the Cisco uBR910 series DSU functions as a cable modem--a modulator/demodulator that conveys data communications over the cable television network.

The Cisco uBR910 series DSU functions as a DOCSIS 1.0 compliant cable modem in terms of its interoperation with the CMTS and cable network. However, it uses a serial interface to connect to a LAN, instead of using an Ethernet interface to connect to customer premises equipment (CPE) devices, as is the case with most cable modems.

The Cisco uBR910 series DSU connects to the access router through a serial interface compatible with the serial interfaces most commonly used in the Cisco 1600 series, Cisco 1700 series, Cisco 2500 series, Cisco 2600 series, and Cisco 3600 series routers. This allows the Cisco uBR910 series DSU to be easily integrated into existing networks.


Note   For information on new features and Cisco IOS commands supported by Release 12.1 T, see "New and Changed Information" section and "Related Documentation" section.

Features

In Cisco IOS Release 12.1(3)T, the Cisco uBR910 series includes the Cisco uBR914 cable DSU, a rack-mountable model with a field-replaceable router interface module. The Cisco uBR914 cable DSU includes the following features:


Note   The serial interface on the Cisco uBR910 series DSU can be connected only to a compatible serial interface on an access router that is acting as a LAN gateway. Cisco does not support connecting the Cisco uBR910 series DSU to a telco device such as a PBX or to a public switched network.

Early Deployment Releases

These release notes describe the Cisco uBR910 series DSU for Cisco IOS Release 12.1(3)T, which is an early deployment (ED) release based on Cisco IOS Release 12.1. Early deployment releases contain fixes for software caveats and support for new Cisco hardware and software features.

Table 1 shows the available early deployment releases of the Cisco uBR910 series DSU.


Table 1: Early Deployment Releases for the Cisco uBR910 series DSU
ED Release Maintenance Release New Hardware and Software Features Availability

Release 12.1 T

(3)

  • Addition of Base IP Bridging image

  • HSRP support for ICMP Redirects

  • Secure Shell (SSH) Version 1 Client support

  • Support for the ip address dhcp command

Now

Release 12.1 XD or earlier releases

(1)

  • Baseline Privacy Interface

  • Baseline Privacy Management Information Base

  • Cable Monitor web diagnostics tool

  • Cisco uBR914 DSU

  • Dynamic Host Configuration Protocol (DHCP) server

  • DOCSIS-compliant bridging

  • DOCSIS 1.0+ extensions

  • F-connector for coaxial cable connectivity

  • Netranger support--Cisco IOS intrusion detection

  • Network Address Translation (NAT) and Port Address Translation (PAT)

  • Quality of Service (QoS) features

  • Routing Information Protocol Version 2 (RIPv2)

  • Smart Serial router interface module for WAN connectivity

Now

System Requirements

This section describes the system requirements for Cisco IOS Releases 12.1(3)T:

Minimum Memory Recommendations

Table 2 lists the minimum memory that is recommended for the feature sets available for the Cisco uBR910 series DSU in Cisco IOS Release 12.1 T. The image subset legend for Table 2 is as follows:


Table 2: Minimum Memory Recommendations for the Cisco uBR910 Series DSU,
Release 12.1(3)T Feature Sets
Feature Set Matrix Term Image Name Recommended
Flash
Memory
Recommended
DRAM
Memory
Runs
From

Base IP Bridging

ubr910-k1-mz

8 MB Flash

16 MB DRAM

RAM

Base IP Routing

ubr910-k1y5-mz

8 MB Flash

16 MB DRAM

RAM

Headend Interoperability

DOCSIS Concatenation

If using DOCSIS concatenation with a 16 QAM symbol rate, the CMTS must be configured for Unique Word 16 in the preamble for both short and long data burst profiles. On the Cisco uBR7200 series universal broadband routers, use the cable modulation-profile global configuration command and specify uw16 for both the long and short modulation profiles. See caveats CSCdp76415 and CSCdp92139 for more detail.

DOCSIS 1.0+ Extensions

Cisco IOS Release 12.1(3)T images support the Cisco DOCSIS 1.0+ Extensions, which include dynamic multi-SID assignment and concatenation. To use the dynamic multi-SID and concatenation features, both the Cisco uBR910 series DSU and the CMTS router must support them. If you are using the Cisco uBR7200 series universal broadband router as the CMTS router, Cisco IOS Release 12.0(7)XR, Release 12.1(1)T, or greater is required on the Cisco uBR7200 series router to activate these features.

To configure the Cisco uBR910 series DSU to support multiple classes of service, you can use the DOCSIS CPE Configurator tool, the Cisco Subscriber Registration Center (CSRC) network suite, or another DOCSIS configuration file editor of your choice. DOCSIS configuration files can define multiple classes of service (CoS) to support voice and other high-priority traffic flows. The first CoS is used for best-effort data and station maintenance traffic, and additional classes of service can be defined to give higher priority for other traffic flows.

Hardware Supported

The Cisco uBR910 Series includes the Cisco uBR914 DSU, which contains:

Determining the Software Version

To determine the version of Cisco IOS software running on your Cisco uBR910 series DSU, log in to the Cisco uBR910 series DSU and enter the show version EXEC command:

router# show version
Cisco Internetwork Operating System Software
IOS (tm) 910 Software (ubr910-k1y5-mz), Version 12.1(3)T, RELEASE SOFTWARE

Upgrading to a New Software Release

For technical information about upgrading to a new software release, see Cisco IOS Upgrade Ordering Instructions on CCO located at:

http://www.cisco.com/warp/public/620/6.html

For other information about upgrading to Cisco IOS Release 12.1, see the product bulletin Cisco IOS Software Release 12.1 Upgrade Paths and Packaging Simplification on CCO at:

Service & Support: Software Center: Cisco IOS Software: Product Bulletins: Software

Under Cisco IOS 12.1, click Cisco IOS Software Release 12.1 Ordering Procedures and Platform Support

Feature Set Tables

Cisco IOS software is packaged in feature sets consisting of software images--depending on the platform. Each feature set contains a specific set of Cisco IOS features.

Table 3 lists the voice and data software images by feature sets for the Cisco uBR910 series DSU. This table uses the following conventions:


Note   These feature set tables might contain a selected list of features. These tables might not be cumulative--nor do they list all the features in each image.


Table 3: Feature List by Feature Set for the Cisco uBR910 series DSU
Features Base IP Bridging Base IP Routing

Baseline Privacy Interface (BPI) Encryption

Yes

Yes

BPI+ Encryption

Yes

No

Baseline Privacy Interface (BPI) MIB

Yes

Yes

Cable Device MIB (RFC 2669)

Yes

Yes

Cable Monitor

Yes

Yes

Cisco Standard MIBs

Yes

Yes

DHCP Server and Proxy Support

No

Yes

DOCSIS 1.0+ Extensions (Dynamic multi-SID assignment and concatenation)

Yes

Yes

DOCSIS-Compliant Bridging

Yes

Yes

Easy IP

No

Yes

Radio Frequency Interface MIB (RFC 2670)

Yes

Yes

Routing (RIP V2)

No

Yes

Secure Shell (SSH) support (client and server)--56-bit encryption

Yes

Yes

New and Changed Information

The following sections list the new hardware and software features supported by the Cisco uBR910 series DSU.

No New Hardware Features in Release 12.1(3)T

There are no new hardware features supported by the Cisco uBR910 series DSU in Cisco IOS Release 12.1(3)T.

New Software Features in Release 12.1(3)T

The following new software features are supported by the Cisco uBR910 series DSU for Release 12.1(3)T. For more information on these features, see the documentation listed in the "Related Documentation" section.

HSRP Support for ICMP Redirects (CSCdp37610)

The HSRP Support for ICMP Redirects feature enables Internet Control Message Protocol (ICMP) redirection on interfaces configured with the Hot Standby Router Protocol.

When running HSRP, it is important to prevent hosts from discovering the interface (or real) MAC addresses of routers in the HSRP group. If a host is redirected by ICMP to the real MAC address of a router, and that router later fails, then packets from the host will be lost. Previously, ICMP redirect messages were automatically disabled on interfaces configured with HSRP.

This feature now enables ICMP redirects on interfaces configured with HSRP. This functionality works by filtering outgoing ICMP redirect messages through HSRP, where the next-hop IP address may be changed to an HSRP virtual IP address.

IP Address Negotiation

Cisco IOS Release 12.1(3)T adds support for the ip address dhcp command on the cable interface. Previous releases used the ip address negotiated command for this purpose, but this command is now reserved for the serial interface. This change is cosmetic only and does not change how the router obtains its IP address. See "IP Address Negotiation" section for additional information.

Secure Shell Version 1 Client Support

Cisco IOS Release 12.1(3)T enhances the Cisco uBR910 series DSU's support for the Secure Shell (SSH) protocol. The Cisco uBR910 series DSU supports SSH version 1, which allows network administrators to make a secure Telnet connection between the DSU and another TCP/IP device. SSH provides for authentication and encryption at the application layer, providing a secure connection even when BPI or IPSec authentication and encryption are not used at the network layer. By default, the SSH feature uses 56-bit DES encryption.

In Cisco IOS Release 12.1(3)T, SSH support includes the following features:

For configuration and other information, see the Secure Shell Version 1 Client feature module, available on CCO and the Documentation CD-ROM.


Note   SSH server support was introduced in Cisco IOS Release 12.1(1)XD. SSH client support and other enhancements were introduced in Cisco IOS Release 12.1(3)T.

New Hardware Features in Release 12.1(1)XD

Cisco IOS Release 12.1(1)XD supports the following models of the Cisco uBR910 series cable data service unit (DSU):

New Software Features in Release 12.1(1)XD

The following new software features are supported by the Cisco uBR910 series DSU for Release 12.1(1)XD (or earlier releases). For more information on these features, see the documentation listed in the "Related Documentation" section.

Baseline Privacy Interface

The DOCSIS Baseline Privacy Interface (BPI) feature is based on the DOCSIS BPI Specification (SP-BPI-I02-990319 or later revision). It provides data privacy across the Hybrid Fiber-Coaxial (HFC) network by encrypting traffic flows between the Cisco uBR910 series DSU and the cable operator's CMTS.

The BPI+ (BPI Plus) feature is an enhancement to the BPI feature and is based on the DOCSIS BPI+ Specification (SP-BPI+-I04-000407 or later revision), which is still in development. In addition to the regular BPI features, BPI+ provides more secure authentication of cable modems through the use of digital certificates. Also, a cable modem can use a digital signature to verify that the software image it has downloaded has not been altered or corrupted in transit.


Note   Cisco IOS Release 12.1(3)T supports BPI encryption but not BPI+ encryption. The CMTS and Cisco uBR910 series DSU must both support and enable BPI to use its features.

Baseline Privacy Management Information Base

The Baseline Privacy Management Information Base (MIB), as currently defined, is available in Cisco IOS Release 12.1(3)T code. BPI allows an SNMP manager to monitor and manage the Cisco uBR910 series DSU's BPI configuration, including whether BPI is enabled, status of current authorization keys, current timeout values, real-time status counters, and additional information about authorization errors.


Note   The SNMP manager must load the DOCSIS-BPI-MIB.my MIB to access the BPI attributes. See the "Cable-Specific MIBs" section for details.

Cable Monitor Web Diagnostics Tool

The Cable Monitor is a web-based diagnostic tool to display the current status and configuration of the Cisco uBR910 series DSU. The Cable Monitor can also be used when the cable network is down, providing an easy way for subscribers to provide necessary information to service technicians and troubleshooters.

Dynamic Host Configuration Protocol Server

The DHCP server feature on the Cisco uBR910 series DSU includes both Intelligent DHCP Relay and DHCP Client functionality. A DHCP Relay Agent is any host that forwards DHCP packets between clients and servers--this enables the client and server to reside on separate subnets. If the Cisco uBR910 series DHCP server cannot satisfy a DHCP request from its own database, it can also act as a DHCP proxy agent by forwarding the DHCP request to one or more secondary DHCP servers.

DOCSIS-Compliant Bridging

DOCSIS-compliant bridging allows the Cisco uBR910 series DSU to operate as a DOCSIS 1.0 cable modem, so that it can interoperate with any DOCSIS-qualified CMTS. This is the default mode of operation for the Cisco uBR910 series DSU.

DOCSIS 1.0+ Extensions

In addition to other QoS features, DOCSIS 1.1 supports a number of features that are required for the delivery of high quality voice traffic. To use these features before the DOCSIS 1.1 specification is finalized, Cisco has created the DOCSIS 1.0+ extensions that contain the most important of these features:

To avoid potentially wasting bandwidth in this manner, the DOCSIS 1.0+ extensions support the dynamic creation of multiple SIDs. New MAC messages dynamically add, delete, and modify SIDs when needed. The Cisco uBR910 series DSU can dynamically create a SID with the QoS parameters needed for a particular traffic flow. When that flow terminates, the router deletes the SID, releasing its bandwidth for use elsewhere.

Note   Both the Cisco uBR910 series DSU and the CMTS must support the dynamic multi-SID and concatenation features for them to be used on the cable network. If you are using the Cisco uBR7200 series universal broadband router as the CMTS, Cisco IOS Release 12.0(7)XR or 12.1(1)T (or later) is required on the Cisco uBR7200 series router to use these features.

NetRanger Support--Cisco IOS Intrusion Detection

Cisco IOS Release 12.1(3)T supports Cisco NetRanger, which is an Intrusion Detection System (IDS) composed of three parts:

Network Address Translation and Port Address Translation

Network address translation (NAT) and port address translation (PAT) frees a private network from needing a worldwide unique IP address for every computer connected to the Internet. Instead, the Cisco uBR910 series DSU translates the IP addresses used on the private network into a global IP address that can be used on the Internet. One IP address can be used for multiple computers because a unique port address identifies the individual computers on the private network.


Note   NAT and PAT are defined in Requests for Comments (RFC) 1631 .

Quality of Service

Quality of service (QoS) is a set of features that identify different types of traffic on a network so that certain types of traffic can be given higher priority than traffic that has only a "best effort" attempt at delivery. This feature is especially important for real-time traffic, such as voice traffic, where delays would have a serious impact on the traffic's usefulness.

Depending on the software image used, the Cisco uBR910 series DSU supports the following QoS features:

Routing Information Protocol Version 2

When configured for routing mode, the Cisco uBR910 series DSU supports the Routing Information Protocol Version 2 (RIPv2). In routing mode the Cisco uBR910 series DSU automatically configures itself to use the headend's IP address as its IP default gateway. This allows the Cisco uBR910 series DSU to send packets not intended for the private LAN to the headend for delivery to the Internet and other networks.


Note   The Cisco uBR910 series DSU supports only static routes and the RIP routing protocol.

Limitations and Restrictions

This section describes warnings and cautions about using Cisco IOS Release 12.1(3)T software.

Bridging Support

The Cisco uBR910 series DSU interoperates with DOCSIS-compliant cable networks. Cisco IOS Release 12.1(3)T does not support bridging traffic across a non-DOCSIS cable network.

IP Address Negotiation

The DOCSIS specifications require that a cable modem obtain its IP address at power-on or reset from a DHCP server that is available through the cable interface. For this reason, the Cisco uBR910 series DSU defaults to a configuration that uses the ip address dhcp command for the cable interface. It is not possible to override this setting by specifying a specific static IP address; to assign a static IP address to the Cisco uBR910 series DSU, configure the DHCP server so that it assigns the desired IP address on the basis of the unit's MAC address.


Note   The ip address negotiated command cannot be used on the cable interface because this command is reserved exclusively for the serial interface. However, in Cisco IOS Release 12.1(3)T when the ip address dhcp command is used for cable interfaces, the configuration files still show the ip address negotiated command, which can generate an "invalid input" error during boot. This is only a cosmetic issue and does not affect the unit's functionality. See the description of caveat CSCdr61697, for more information.

Upgrading Software Images Using BPI

To enable BPI encryption, the Cisco uBR910 series DSU must use a Cisco IOS image that supports BPI encryption. If the current software image does not support BPI encryption (or if the current software image is corrupted), you must disable BPI encryption in the DOCSIS configuration file and reset the Cisco uBR910 series DSU before you will be able to download a new software image.

Using Multiple PCs with the Cisco uBR910 series DSU

The MAX CPE parameter in a Cisco uBR910 series DSU's DOCSIS configuration file determines how many PCs (or other CPE devices) are supported when both the Cisco uBR910 series DSU and access router are operating in bridging mode. The default value for the MAX CPE parameter is 1, which means only one PC can access the cable network through the Cisco uBR910 series DSU when both the Cisco uBR910 series DSU and access router are operating in bridging mode.


Note   If either the Cisco uBR910 series DSU or access router are operating in routing mode, the MAX CPE parameter does not limit the number of CPE devices in the local network. See the "MAX CPE Parameter" section for more information.

The DOCSIS 1.0 specification states that a CMTS cannot age-out MAC addresses for CPE devices, so the first PC connected to the Cisco uBR910 series DSU is normally the only one that the CMTS recognizes as valid. If a subscriber replaces an existing PC or changes its network interface card (NIC) to one that has a different MAC address, the CMTS will refuse to let the PC come online because this would exceed the maximum number of CPE devices specified by the MAX CPE parameter. A similar thing would happen if a user decides to move a PC from one Cisco uBR910 series DSU to another.

To allow a subscriber to replace an existing PC or NIC, the following workarounds are possible:

Using the Reset Switch

The reset switch on the back panel of the Cisco uBR910 series DSU is recessed to prevent accidental resets. To depress the switch, use a blunt object, such as a pen or pencil point; do not use a sharp object, such as a knife or awl, because this could damage the switch and the DSU's circuitry.

Important Notes

This section contains important information about using Cisco IOS Release 12.1(3)T software.

Using Access Lists

Access lists 100 and 101 should never be manually configured on the Cisco uBR910 series cable DSU because they are reserved by the DSU for internal purposes. Use access lists 102 through 199 instead.

CPE Device Filtering

In Cisco IOS Release 12.1(2)T and above, the docsDevCpeIpMax attribute defaults to -1 instead of the previous default of 1. This attribute controls the maximum number of CPE devices that can pass traffic through the Cisco uBR910 series DSU's serial interface as follows:

CPE IP address filtering is done as part of the following process:

    1. MAC address filtering--Packets are filtered on the basis of the CPE device's MAC address. This is controlled by the value of the MAX CPE parameter, which is set in the DOCSIS configuration file.

    2. Link Level Control (LLC) filtering--Packets are filtered on the basis of the packet's protocol. This is controlled by the docsDevFilterLLCTable table.

    3. CPE IP address filtering--Packets are filtered on the basis of the CPE device's IP address, as controlled by the docsDevCpeIpMax attribute and docsDevFilterCpeTable table.

    4. Access list filtering--Packets are filtered on the basis of access lists. IP filtering is controlled by the docsDevFilterIpTable table, and SNMP access filters are controlled by the docsDevNmAccessTable.

See the DOCS-CABLE-DEVICE-MIB.my MIB for more information on the attributes and tables listed above.

Disabling the Finger Server

By default, the Cisco uBR910 series DSU enables its onboard TCP/IP "finger" server to allow remote users to query the number and identities of any users who are logged in to the router. Unless your network operations center (NOC) requires this service, it should be disabled to prevent denial of service attacks that access the finger server's well-known port (TCP port 79). To disable the finger server, include the no service finger command in the Cisco IOS configuration file that the router downloads at initial power-on.

MAX CPE Parameter

The DOCSIS specification requires that the headend enforce the MAX CPE parameter, which specifies the maximum number of CPE devices that can connect to the cable network through a particular cable modem. However, because the Cisco uBR910 series DSU does not connect to CPE devices directly but instead connects to the subscriber LAN through an access router, the MAX CPE parameter behaves somewhat differently than with standard DOCSIS cable modems.

When the access router is configured as an IP router, it uses its own MAC address as the source address for all outgoing packets. Because the MAX CPE parameter distinguishes CPE devices by MAC address, a value of 1 for the MAX CPE parameter is sufficient for any number of computers in the subscriber network because the access router's MAC address is used for all CPE devices in that network.

The MAX CPE parameter is enforced, through, when both the Cisco uBR910 series DSU and access router are operating in IP bridging mode. In this situation, outgoing packets are transmitted with the CPE devices' original MAC addresses, and the MAX CPE parameter must be set to a high enough value to allow access for all CPE devices on the subscriber network. If MAX CPE is set too low, some devices on the subscriber network will not be able to access the cable network.


Note   The Cisco uBR910 series supports a maximum of 254 CPE devices in bridging mode.

Maximum Serial Interface Speed

The Cisco uBR910 series DSU supports a maximum serial interface speed of up to 8 Mbps, depending on the maximum speed supported by the connected access router. Table 4 lists the maximum speeds for the WIC serial interfaces supported by specific Cisco access routers; for other access routers, see their documentation for details.


Table 4: Maximum Supported Serial Interface Speeds
Cisco Access Router Maximum Supported WIC Interface Speed

Cisco 805

512 Kbps

Cisco 1600 series

2 Mbps

Cisco 1700 series

2 Mbps

Cisco 2500 series

2 Mbps

Cisco 2600 series

2 Mbps--8 Mbps (depending on slot used)1

Cisco 3600 series

2 Mbps--8 Mbps (depending on slot used)1

1See the product literature for the Cisco 2600 series and Cisco 3600 series , available on CCO, for more details.


Note   The maximum serial interface speed does not guarantee a maximum throughput rate for traffic sent across the cable network. The actual throughput depends on the capabilities of the connected access router and cable network, as well as any bandwidth restrictions imposed by the CMTS.

Supported MIBs

The Cisco uBR910 series DSU supports the following categories of MIBs:

Cable Device MIBs

The Cisco uBR910 series DSU supports the Cable Device MIB, which is defined by RFC 2669 and describes DOCSIS-compliant cable modems and CMTS. The Cable Device MIB records statistics related to the configuration and status of the cable modem. Statistics include an events log and device status. The following list details the components of the Cable Device MIB:

The Cable Device MIB is very similar to the RFI MIB in that both allow access to cable-related statistics. However, the Cable Device MIB provides statistics on the cable modem, and the RFI MIB provides statistics on the radio frequency transmissions over the cable television line.

Cisco Standard MIBs

The Cisco uBR910 series DSU supports the Cisco Standard MIBs, which consist of the following components:


Note   The Cisco Management Information Base (MIB) User Quick Reference publication is no longer published. For the latest list of MIBs supported by Cisco, see the Cisco Network Management Toolkit on Cisco Connection Online (CCO). From the CCO home page, click on this path: Service & Support: Software Center: Network Mgmt Products: Cisco Network Management Toolkit: Cisco MIB

Radio Frequency Interface MIBs

The Cisco uBR910 series DSU supports the Radio Frequency Interface (RFI) MIB. The RFI MIB module is defined in RFC 2670  and describes DOCSIS-compliant radio frequency interfaces in cable modems and CMTS. On the cable modem, RFI MIB entries provide:

The RFI MIB includes tables describing both the CMTS and the cable modem side of the cable interface. All cable modem tables are implemented.

Cable-Specific MIBs

Table 5 shows the cable-specific MIBs that are supported on the Cisco uBR910 series DSU. This table also provides a brief description of each MIB's contents and the Cisco IOS software release in which the MIB was initially functional--earlier releases might have had unsupported prototype versions of the MIB; later releases might have added new attributes and functionality.


Note   The names given in Table 5 are the filenames for the MIBs as they exist on Cisco's FTP site (ftp://ftp.cisco.com/pub/mibs or http://www.cisco.com/public/mibs ). Most MIBs are available in both SNMPv1 and SNMPv2 versions; the SNMPv1 versions have V1SMI as part of their filenames. Also see the Cisco MIBs home page at http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml.


Table 5: Supported MIBs for the Cisco uBR910 series DSU
MIB Filename Description Release

SNMPv2-SMI.my

SNMPv2-SMI-V1SMI.my

This module specifies the Structure of Management Information (SMI) for SNMPv2, as defined in RFC 1902.

12.1(1)XD

SNMPv2-TC.my

SNMPv2-TC-V1SMI.my

This module defines the textual conventions as specified in pages 4, 10-11 of RFC 854.

12.1(1)XD

CISCO-SMI.my

CISCO-SMI-V1SMI.my

This module specifies the Structure of Management Information (SMI) for Cisco's enterprise MIBs.

12.1(1)XD

CISCO-TC.my

CISCO-TC-V1SMI.my

This module defines the textual conventions used in Cisco's enterprise MIBs.

12.1(1)XD

IF-MIB.my

IF-MIB-V1SMI.my

This module describes generic objects for the Layer 3 network interface sublayers. This MIB is an updated version of MIB-II's if table, and incorporates the extensions defined in RFC 1229.

12.1(1)XD

CISCO-CABLE-SPECTRUM-MIB.my

CISCO-CABLE-SPECTRUM-MIB-V1SMI.my

This module describes the spectrum management flap list attributes.

12.1(1)XD

DOCS-IF-MIB.my

DOCS-IF-MIB-V1SMI.my

This module describes the DOCSIS-compliant Radio Frequency (RF) interfaces in cable modems and cable modem termination systems, as described in RFC 2670.

12.1(1)XD

DOCS-BPI-MIB.my

DOCS-BPI-MIB-V1SMI.my

This module describes the attributes for the DOCSIS-specified Baseline Privacy Interface (BPI) on cable modems and the CMTS.

12.1(1)XD

CISCO-DOCS-EXT-MIB.my

CISCO-DOCS-EXT-MIB-V1SMI.my

This module extends the DOCSIS standard RFI MIB (DOCS-IF-MIB) with Cisco-specific extensions, such as QoS attributes and connection status and other information regarding the cable modems and CPE devices supported by the CMTS.

12.1(1)XD

DOCS-CABLE-DEVICE-MIB.my

DOCS-CABLE-DEVICE-MIB-V1SMI.my

This module was previously known as the CABLE-DEVICE-MIB and contains cable-related objects for DOCSIS-compliant cable modems, as specified in RFC 2669.

12.1(1)XD


Note   Because of interdependencies, the MIBs must be loaded in the order given in Table 5.

Deprecated MIBs

A number of Cisco-provided MIBs have been replaced with more scalable, standardized MIBs; these MIBs have filenames that start with "OLD" and first appeared in Cisco IOS Release 10.2. The functionality of these MIBs has already been incorporated into replacement MIBs, but the old MIBs are still present to support existing Cisco IOS products or NMS applications. However, because the deprecated MIBs will be removed from support in the future, you should update your network management applications and scripts to refer to the table names and attributes that are found in the replacement MIBs.

Table 6 shows the deprecated MIBs and their replacements. In most cases, SNMPv1 and SNMPv2 replacements are available, but some MIBs are available only in one version. A few of the deprecated MIBs do not have replacement MIBs; support for these MIBs will be discontinued in a future release of Cisco IOS software.


Table 6: Replacements for Deprecated MIBs
Deprecated MIB Replacement MIBs
SNMPv1 MIB SNMPv2 MIB

OLD-CISCO-APPLETALK-MIB

RFC1243-MIB

--

OLD-CISCO-CHASSIS-MIB

ENTITY-MIB-V1SMI

ENTITY-MIB

OLD-CISCO-CPU-MIB

--

CISCO-PROCESS-MIB

OLD-CISCO-DECNET-MIB

--

--

OLD-CISCO-ENV-MIB

CISCO-ENVMON-MIB-V1SMI

CISCO-ENVMON-MIB

OLD-CISCO-FLASH-MIB

CISCO-FLASH-MIB-V1SMI

CISCO-FLASH-MIB

OLD-CISCO-INTERFACES-MIB

IF-MIB-V1SMI
CISCO-QUEUE-MIB-V1SMI

IF-MIB
CISCO-QUEUE-MIB

OLD-CISCO-IP-MIB

--

--

OLD-CISCO-MEMORY-MIB

CISCO-MEMORY-POOL-MIB-V1S MI

CISCO-MEMORY-POOL-MIB

OLD-CISCO-NOVELL-MIB

NOVELL-IPX-MIB

--

OLD-CISCO-SYS-MIB

(Compilation of other OLD* MIBS)

OLD-CISCO-SYSTEM-MIB

CISCO-CONFIG-COPY-MIB-V1S MI

CISCO-CONFIG-COPY-MIB

OLD-CISCO-TCP-MIB

CISCO-TCP-MIB-V1SMI

CISCO-TCP-MIB

OLD-CISCO-TS-MIB

--

--

OLD-CISCO-VINES-MIB

CISCO-VINES-MIB-V1SMI

CISCO-VINES-MIB

OLD-CISCO-XNS-MIB

--

--


Note   Some of the MIBs listed in Table 6 represent feature sets that are not supported on the Cisco uBR910 series DSU.

Caveats

Caveats describe unexpected behavior in Cisco IOS software releases. Severity 1 caveats are the most serious caveats; severity 2 caveats are less serious.

This section contains open and resolved caveats for Cisco IOS Release 12.1(3)T. All caveats in Release 12.1 and Release 12.1 T are also in Release 12.1(3)T.

For information on caveats in Cisco IOS Release 12.1 and Release 12.1 T, see Caveats for Cisco  IOS Release 12.1 , which lists severity 1 and 2 caveats, and is located on CCO and the Documentation CD-ROM.


Note   If you have an account with CCO, you can use Bug Navigator II to find caveats of any severity for any release. To reach Bug Navigator II, go to CCO and press Login. Then go to Software Center: Cisco IOS Software: Cisco Bugtool Navigator II. Another option is to go to http://www.cisco.com/support/bugtools (you must have an account on CCO to access this site).

Open Caveats--Release 12.1(3)T

All the caveats listed in this section are open in Release 12.1(3)T for the Cisco uBR910 series DSU:

The Cisco uBR910 series DSU, when running the NAT and firewall features, crashes if establishing roughly 150 Telnet sessions (using the solaris_telnet client). The workaround is to avoid creating that many Telnet sessions.
The Cisco uBR910 series DSU can stop responding to CMTS requests when upstreams are configured with different minislot sizes. The workaround is to configure the upstreams on the CMTS with the same minislot size.
The Cisco uBR910 series DSU might not come up when all four downstreams are combined through the upconverter and all of the upstreams of the four cards are combined. When the Cisco uBR910 series DSU is instructed to go to a different downstream, it obtains the correct IP address for the new downstream, but fails to update the default gateway according to the DHCP reply; it subsequently fails to obtain the time-of-day (TOD) or to download the DOCSIS configuration file. The default gateway address must be corrected manually before the router succeeds in obtaining the configuration file and in getting the current time-of-day.
Packets can be unexpectedly dropped on the upstream channel when the Cisco uBR910 is configured to use DOCSIS concatenation and the upstream is using 16 QAM symbol rate. The workaround is to configure the CMTS for a preamble with Unique Word 16 for both the short and long data burst profile. On the Cisco uBR7200 series universal broadband routers, this can be done with the cable modulation-profile global configuration command, specifying uw16 for both the long and short modulation profiles.
Upstream performance for data traffic on a DOCSIS 1.0 cable modem is limited to approximately 1.7 mbits per second, due to the limits of using one SID for data traffic, as required by the DOCSIS 1.0 specification. This caveat cannot be resolved until the implementation of the DOCSIS 1.1 specification, which provides for multiple SIDs for data traffic. There is no workaround.
The Cisco uBR910 series DSU stops passing traffic and appears to hang when trying to copy a configuration file from Flash memory to active memory. For example, the problem occurs when using either of the following sequence of commands:
    copy startup-config flash: 
    copy flash:startup-config startup-config 
     
    
or
    copy startup-config bootflash: 
    copy bootflash:startup-config startup-config 
     
    
The workaround is to first copy the configuration file from the Flash memory to a TFTP server using the copy flash:startup-config tftp: command. Then use the copy tftp:startup-config startup-config command to copy the file to active memory.
The Cisco uBR910 series DSU defaults to using the ip address dhcp command to set the IP address for the cable interface during power-on provisioning. However, the start-up and running configurations show that the cable interface uses the ip address negotiated command instead. Because only the serial interface can use the ip address negotiated command, this generates an "invalid input" error during start-up. This is only a cosmetic error, however, and does not affect any functionality. There is no workaround.

Closed or Resolved Caveats--Release 12.1(3)T

All the caveats listed in this section are closed or resolved in Release 12.1(3)T for the Cisco uBR910 series DSU:

The Cable Monitor web diagnostic tool was not operational in Cisco IOS Release 12.1(1)XD. There was no workaround and Cisco recommended disabling both the Cable Monitor and Cisco web server on the Cisco uBR910 series DSU using the no ip http cable-monitor and no ip http server commands, respectively.
This caveat is resolved in Cisco IOS Release 12.1(3)T.
A defect could cause a Cisco router to crash and hang when the Cisco web server was enabled with the ip http server command and a browser connects to http://<router-ip>/%%. The defect could be exploited to produce a denial of service (DoS) attack. This fact was announced on public Internet mailing lists which are widely read both by security professionals and by security "crackers", and should be considered public information.
The workaround to this defect was to disable the Cisco web server with the command:
    no ip http server 
Alternatively, the administrator could choose to block port 80 connections to the router using access lists or other firewall methods. For further information a Security Advisory will be posted to http://www.cisco.com/warp/public/707/advisory.html (you do not need a CCO account to access this link).
This caveat is resolved in Cisco IOS Release 12.1(3)T.

Note   Although CSCdr36952 has been resolved in Release 12.1(3)T, the Cisco web server should still be disabled using the no ip http server command. See CSCdr31347 in the previous section for more information.

Packet loss can occur on the Cisco uBR910 series DSU on both the upstream and downstream channels in the following situation:
The problem occurs because BPI does not support the use of static routes on the CMTS. When the CMTS uses this configuration, it does not immediately flush its route cache when the BPI keys are renegotiated. Packets are then transmitted using stale cache information that contains the old BPI key information; because those keys are no longer valid, the packets are dropped.
To resolve this problem, configure the CMTS so that its route to the subscriber LAN refers to the IP address of the cable interface for the Cisco uBR910 series DSU. For example, if the subscriber LAN has the network address of 209.165.201.0, the following static route on the CMTS creates the problem:
    ip route 209.165.201.0 225.255.255.224 int c2/0 
To avoid the problem, reconfigure the CMTS with a route that refers to the cable interface for the Cisco uBR910 series DSU (in this example, 192.168.100.1):
    ip route 209.165.201.0 225.255.255.224 192.168.100.1 
This caveat has been closed without modification because using static routes on the CMTS is not supported when using BPI encryption.

Related Documentation

The following sections describe the documentation available for the Cisco uBR910 series DSU. These documents consist of hardware and software installation guides, Cisco IOS configuration and command references, system error messages, feature modules, and other documents.

Most documentation is available as printed manuals or electronic documents, except for feature modules and select manuals, which are available online on CCO and the Documentation CD-ROM.

Use these release notes with these documents:

Release-Specific Documents

The following documents are specific to Release 12.1 and are located on CCO and the Documentation CD-ROM:

On CCO at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Release Notes: Cross-Platform Release Notes
Technical Documents
As a supplement to the caveats listed in these release notes, see Caveats for Cisco  IOS Release 12.1, which contains caveats applicable to all platforms for all maintenance releases of Release 12.1.
On CCO at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Caveats
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS 12.1: Caveats

Note   If you have an account with CCO, you can use Bug Navigator II to find caveats of any severity for any release. To reach Bug Navigator II, go to CCO and press Login. Then go to Software Center: Cisco IOS Software: Cisco Bugtool Navigator II. Another option is to go to http://www.cisco.com/support/bugtools (you must have an account on CCO to access this site).

Platform-Specific Documents

These documents are available for the Cisco uBR910 series DSU on CCO and the Documentation CD-ROM:

On CCO at:

Technical Documents: Documentation Home Page: Cisco Product Documentation: Broadband/Cable Solutions: Cisco uBR900 Series Cable Access Routers

On the Documentation CD-ROM at:

Cisco Product Documentation: Broadband/Cable Solutions: Cisco uBR900 Series Cable Access Routers

Feature Modules

Feature modules describe new features supported by Release 12.1, and are updates to the Cisco IOS documentation set. A feature module consists of a brief overview of the feature, benefits, configuration tasks, and a command reference. As updates, the feature modules are available online only. Feature module information is incorporated in the next printing of the Cisco IOS documentation set.

On CCO at:

Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: New Feature Documentation

On the Documentation CD-ROM at:

Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: New Feature Documentation

Cisco IOS Software Documentation Set

The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents that are available in electronic form on the Documentation CD-ROM and CCO, as well as separately orderable in printed versions.

Documentation Modules

Each module in the Cisco IOS documentation set consists of two books: a configuration guide and a corresponding command reference. Chapters in a configuration guide describe protocols, configuration tasks, Cisco IOS software functionality, and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference.

On CCO and the Documentation CD-ROM, two master hot-linked documents provide information for the Cisco IOS software documentation set.

On CCO at:

Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Configuration Guides and Command References

On the Documentation CD-ROM at:

Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1: Configuration Guides and Command References

Release 12.1 Documentation Set

Table 7 describes the contents of the Cisco IOS Release 12.1 software documentation set, which is available in electronic form and in printed form upon request.


Note   You can find the most current Cisco IOS documentation on CCO  and the Documentation CD-ROM. These electronic documents may contain updates and modifications made after the hard-copy documents were printed.

On CCO at:

Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.1

On the Documentation CD-ROM at:

Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.1


Table 7: Cisco IOS Software Release 12.1 Documentation Set
Books Major Topics

  • Cisco IOS Configuration Fundamentals Configuration Guide

  • Cisco IOS Configuration Fundamentals Command Reference

Configuration Fundamentals Overview
Cisco IOS User Interfaces
Cisco IOS File Management
Cisco IOS System Management
Cisco IOS User Interfaces Commands
Cisco IOS File Management Commands
Cisco IOS System Management Commands

  • Cisco IOS Bridging and IBM Networking Configuration Guide

  • Cisco IOS Bridging and IBM Networking Command Reference, Volume I

  • Cisco IOS Bridging and IBM Networking Command Reference, Volume II

Transparent Bridging
Source-Route Bridging
Token Ring Inter-Switch Link
Remote Source-Route Bridging
DLSw+
Serial Tunnel and Block Serial Tunnel Commands
LLC2 and SDLC Commands
IBM Network Media Translation Commands
SNA Frame Relay Access Support Commands
NCIA Client/Server Commands
Airline Product Set Commands

  • Cisco IOS Dial Services Configuration Guide: Terminal Services

  • Cisco IOS Dial Services Configuration Guide: Network Services

  • Cisco IOS Dial Services Command Reference

Preparing for Dial Access
Modem Configuration and Management
ISDN and Signalling Configuration
PPP Configuration
Dial-on-Demand Routing Configuration
Dial-Backup Configuration
Terminal Service Configuration
Large-Scale Dial Solutions
Cost-Control Solutions
Virtual Private Networks
X.25 on ISDN Solutions
Telco Solutions
Dial-Related Addressing Services
Dial Access Scenarios

  • Cisco IOS Interface Configuration Guide

  • Cisco IOS Interface Command Reference

Interface Configuration Overview
Configuring LAN Interfaces
Configuring Serial Interfaces
Configuring Logical Interfaces

  • Cisco IOS IP and IP Routing Configuration Guide

  • Cisco IOS IP and IP Routing Command Reference

IP Overview
IP Addressing and Services
IP Routing Protocols
IP Multicast

  • Cisco IOS AppleTalk and Novell IPX Configuration Guide

  • Cisco IOS AppleTalk and Novell IPX Command Reference

AppleTalk and Novell IPX Overview
Configuring AppleTalk
Configuring Novell IPX

  • Cisco IOS Apollo Domain, Banyan VINES, DECnet, ISO CLNS, and XNS Configuration Guide

  • Cisco IOS Apollo Domain, Banyan VINES, DECnet, ISO CLNS, and XNS Command Reference

Overview
Configuring Apollo Domain
Configuring Banyan VINES
Configuring DECnet
Configuring ISO CLNS
Configuring XNS

  • Cisco IOS Multiservice Applications Configuration Guide

  • Cisco IOS Multiservice Applications Command Reference

Multiservice Applications Overview
Voice
Video
Broadband

  • Cisco IOS Quality of Service Solutions Configuration Guide

  • Cisco IOS Quality of Service Solutions Command Reference

Quality of Service Overview
Classification
Congestion Management
Congestion Avoidance
Policing and Shaping
Signalling
Link Efficiency Mechanisms
Quality of Service Solutions

  • Cisco IOS Security Configuration Guide

  • Cisco IOS Security Command Reference

Security Overview
Authentication, Authorization, and Accounting (AAA)
Security Server Protocols
Traffic Filtering and Firewalls
IP Security and Encryption
Configuring Passwords and Privileges
Neighbor Router Authentication:
Configuring IP Security Options

  • Cisco IOS Switching Services Configuration Guide

  • Cisco IOS Switching Services Command Reference

Cisco IOS Switching Services Overview
Cisco IOS Switching Paths
Cisco Express Forwarding
NetFlow Switching
Multiprotocol Label Switching
Multilayer Switching
Multicast Distributed Switching
Virtual LANs
LAN Emulation

  • Cisco IOS Wide-Area Networking Configuration Guide

  • Cisco IOS Wide-Area Networking Command Reference

Introduction: Wide-Area Networking Overview
Configuring ATM
Configuring Frame Relay
Configuring Frame Relay-ATM Interworking
Configuring SMDS
Configuring X.25 and LAPB

  • Cisco IOS Configuration Master Index

  • Cisco IOS Command Reference Master Index

  • Cisco IOS Debug Command Reference

  • Cisco IOS Dial Services Quick Configuration Guide

  • Cisco IOS Software System Error Messages

  • Cisco IOS Configuration Guide Master Index

  • New Features in 12.1-Based Limited Lifetime Releases

  • New Features in Release 12.1 T

  • Release Notes (Release note and caveat documentation for 12.1-based releases and various platforms)

 


Note   Cisco Management Information Base (MIB) User Quick Reference is no longer published. If you have an account with CCO, you can find latest list of MIBs supported by Cisco. To reach the Cisco Network Management Toolkit, press Login at CCO and go to Software Center: Network Mgmt Products: Cisco Network Management Toolkit: Cisco MIB.

Obtaining Documentation

World Wide Web

You can access the most current Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

Documentation CD-ROM

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM is updated monthly. Therefore, it is probably more current than printed documentation. The CD-ROM package is available as a single unit or as an annual subscription.

Ordering Documentation

Registered CCO users can order the Documentation CD-ROM and other Cisco Product documentation through our online Subscription Services at http://www.cisco.com/cgi-bin/subcat/kaojump.cgi.

Nonregistered CCO users can order documentation through a local account representative by calling Cisco's corporate headquarters (California, USA) at 408 526-4000 or, in North America, call 800 553-NETS (6387).

Obtaining Technical Assistance

Cisco provides Cisco Connection Online (CCO)  as a starting point for all technical assistance. Warranty or maintenance contract customers can use the Technical Assistance Center. All customers can submit technical feedback on Cisco documentation using the web, e-mail, a self-addressed stamped response card included in many printed documents, or by sending mail to Cisco.

Cisco Connection Online

Cisco continues to revolutionize how business is done on the Internet. Cisco Connection Online is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at anytime, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.

CCO's broad range of features and services helps customers and partners to streamline business processes and improve productivity. Through CCO, you will find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online support services, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available.

Customers and partners can self-register on CCO to obtain additional personalized information and services. Registered users may order products, check on the status of an order and view benefits specific to their relationships with Cisco.

You can access CCO  in the following ways:

You can e-mail questions about using CCO to cco-team@cisco.com.

Technical Assistance Center

The Cisco Technical Assistance Center (TAC) is available to warranty or maintenance contract customers who need technical assistance with a Cisco product that is under warranty or covered by a maintenance contract.

To display the TAC web site that includes links to technical support information and software upgrades and for requesting TAC support, use www.cisco.com/techsupport.

To contact by e-mail, use one of the following:

Language
E-mail Address

English

tac@cisco.com

Hanzi (Chinese)

chinese-tac@cisco.com

Kanji (Japanese)

japan-tac@cisco.com

Hangul (Korean)

korea-tac@cisco.com

Spanish

tac@cisco.com

Thai

thai-tac@cisco.com

In North America, TAC can be reached at 800 553-2447 or 408 526-7209. For other telephone numbers and TAC e-mail addresses worldwide, consult the following web site: http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml.

Software Configuration Tips on the Cisco Technical Assistance Center Home Page

If you have a CCO login account, you can access the following URL, which contains links and tips on configuring your Cisco products:

http://www.cisco.com/kobayashi/technotes/serv_tips.shtml

This URL is subject to change without notice. If it changes, point your Web browser to CCO, press Login, and click on this path: Technical Assistance Center: Technical Tips.

The following sections are provided from the Technical Tips page:

Documentation Feedback

If you are reading Cisco product documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco.

You can e-mail your comments to bug-doc@cisco.com.

To submit your comments by mail, for your convenience many documents contain a response card behind the front cover. Otherwise, you can mail your comments to the following address:

Cisco Systems, Inc.
Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883

We appreciate and value your comments.





hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Aug 17 14:35:23 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.