Specifications
Table Of Contents
- Contents
- Introduction
- System Requirements
- New and Changed Information
- No New Hardware Features in Release 12.0(7)T
- New Software Features in Release 12.0(7)T
- No New Hardware Features In Release 12.0(5)T
- New Software Features in Release 12.0(5)T
- No New Hardware Features In Release 12.0(4)T
- No New Software Features In Release 12.0(4)T
- No New Hardware Features In Release 12.0(3)T
- New Software Features In Release 12.0(3)T
- New Software Features In Release 12.0(2)XC
- Limitations and Restrictions
- Important Notes
- Caveats
- Related Documentation
- Service and Support
- Cisco Connection Online
- Documentation CD-ROM

Release Notes for Cisco uBR904 Cable Access Router for Cisco IOS Release 12.0(7)T 9
New Software Features In Release 12.0(2)XC
• Eliminates the need to readdress all hosts with existing private network addresses (one-to-one
translation) or by enabling all internal hosts to share a single registered IP address (many-to-one
translation, also known as Port Address Translation [PAT])
• Enables packets to be routed correctly to and from the outside world by using the Cisco uBR904
cable access router
• Allows personal computers on the Ethernet interface to have IP addresses to be mapped to the
cable interface’s IP address
Routing protocols will run on the Ethernet interface instead of the cable interface, and all packets
received will be routed out the Ethernet interface or use the default gateway to reach the CMTS. This
eliminates the need to run RIP on the cable interface.
To implement NAT on the Cisco uBR904 cable access router, the Ethernet interface is configured
with an “inside” address and the cable interface is configured with an “outside” address. The
Cisco uBR904 cable access router also supports configuration of static connections, dynamic
connections, and address pools.
Full and DOCSIS-Compliant Bridging
Full and DOCSIS-Compliant Bridging allows the Cisco uBR904 cable access router to operate with
any DOCSIS-qualified CMTS.
IPSec Network Security
IPSec Network Security (IPSec) is an IP security feature that provides robust authentications and
encryption of IP packets. IPSec is a framework of open standards developed by the Internet
Engineering Task Force (IETF). IPSec provides security for transmission of sensitive information
over unprotected networks such as the Internet. IPSec acts at the network layer, protecting and
authenticating IP packets between participating IPSec devices (“peers”) such as Cisco uBR904 cable
access routers.
IPSec provides the following network security services:
• Privacy—IPSec can encrypt packets before transmitting them across a network.
• Integrity—IPSec authenticates packets at the destination peer to ensure that the data has not been
altered during transmission.
• Authentication—Peers authenticate the source of all IPSec-protected packets.
• Anti-replay protection—Prevents capture and replay of packets; helps protect against
denial-of-service attacks.
Layer 2 Tunneling Protocol
Layer 2 Tunneling Protocol (L2TP) is an emerging Internet Engineering Task Force (IETF) standard
that combines Cisco’s Layer 2 Forwarding (L2F) and Microsoft’s Point-to-Point Tunneling Protocol
(PPTP). L2TP is an extension of the Point-to-Point Protocol (PPP), which is an important
component for Access Virtual Private Networks (VPNs).
Note The L2TP feature is removed in Cisco IOS Release 12.0(7)T.