Technical information

ADC Telecommunications, Inc.
516 C
HAPTER 18: CONFIGURING AND MONITORING CABLE MODEM TERMINATION SYSTEMS
Configuring Authorization and Traffic Encryption Keys
You can configure and view lifetime in seconds for all existing authorization
and Traffic Encryption Keys (TEKs), for a specified interface. Follow this
procedure:
1. In the BPI Parameters window, click the Privacy Base Parameters tab.
2. Enter values for the parameters. Refer to Table 18-14.
3. Click Apply to persist the information or click Reset to return to the
default values.