user manual
Configuring Headend Broadband Access Router Features
Configuring and Activating Baseline Privacy
MC-561
Cisco IOS Multiservice Applications Configuration Guide
Verifying Upstream Data Backoff Automatic
To verify backoff window settings, enter the show controllers cable 6/0 u0 command for the upstream
port you have just configured:
CMTS01# show controllers cable 6/0 u0
Cable6/0 Upstream 0 is up
Frequency 24.016 MHz, Channel Width 1.600 MHz, QPSK Symbol Rate 1.280 Msps
Spectrum Group is overridden
SNR 33.2560 dB
Nominal Input Power Level 0 dBmV, Tx Timing Offset 2288
Ranging Backoff automatic (Start 0, End 3)
Ranging Insertion Interval automatic (60 ms)
Tx Backoff Start 0, Tx Backoff End 4
Modulation Profile Group 1
part_id=0x3137, rev_id=0x03, rev2_id=0xFF
nb_agc_thr=0x0000, nb_agc_nom=0x0000
Range Load Reg Size=0x58
Request Load Reg Size=0x0E
Minislot Size in number of Timebase Ticks is = 8
Minislot Size in Symbols = 64
Bandwidth Requests = 0xFE
Piggyback Requests = 0xD
Invalid BW Requests= 0x2
Minislots Requested= 0x2963
Minislots Granted = 0x2963
Minislot Size in Bytes = 16
Map Advance = 4000 usecs
UCD Count = 32964
DES Ctrl Reg#0 = C000C043, Reg#1 = 0
Troubleshooting Tips
To troubleshoot the configuration, perform the following tasks:
• Make sure the cable connections are not loose or disconnected.
• Make sure the Cisco cable modem card is firmly seated in its chassis slot and the captive installation
screws are tight.
• Make sure you entered the correct slot and port numbers when you typed the command.
• Make sure you entered the correct upstream port number:
–
On the MC16C cable modem card, this can be u0 to u5.
–
On the MC14C cable modem card, this can be u0 to u3.
–
On the MC12C cable modem card, this can be u0 or u1.
–
On the MC11C cable modem card, this can be u0 only.
Configuring and Activating Baseline Privacy
To encrypt upstream and downstream data, you need to configure and activate baseline privacy. Baseline
privacy on an HFC network is configured with key encryption keys (KEKs) and traffic encryption keys
(TEKs). The encryption is based on 40-bit or 56-bit data encryption standard (DES) encryption
algorithms.