Installation guide
3-23
Cisco uBR7100 Series Universal Broadband Router Software Configuration Guide
OL-2238-03
Chapter 3 Configuring the Cisco Cable Interface
Enabling and Configuring Baseline Privacy
Verifying Upstream Data Backoff Automatic
To verify backoff window settings, enter the show controllers cable command for the upstream port you
have just configured:
CMTS01# show controllers cable1/0 u0
Cable1/0 Upstream 0 is up
Frequency 24.016 MHz, Channel Width 1.600 MHz, QPSK Symbol Rate 1.280 Msps
Spectrum Group is overridden
SNR 33.2560 dB
Nominal Input Power Level 0 dBmV, Tx Timing Offset 2288
Ranging Backoff automatic (Start 0, End 3)
Ranging Insertion Interval automatic (60 ms)
Tx Backoff Start 0, Tx Backoff End 4
Modulation Profile Group 1
part_id=0x3137, rev_id=0x03, rev2_id=0xFF
nb_agc_thr=0x0000, nb_agc_nom=0x0000
Range Load Reg Size=0x58
Request Load Reg Size=0x0E
Minislot Size in number of Timebase Ticks is = 8
Minislot Size in Symbols = 64
Bandwidth Requests = 0xFE
Piggyback Requests = 0xD
Invalid BW Requests= 0x2
Minislots Requested= 0x2963
Minislots Granted = 0x2963
Minislot Size in Bytes = 16
Map Advance = 4000 usecs
UCD Count = 32964
DES Ctrl Reg#0 = C000C043, Reg#1 = 0
Enabling and Configuring Baseline Privacy
Introduction to the Baseline Privacy Interface (BPI)
BPI gives subscribers data privacy across the RF network, encrypting traffic flows between the CMTS
and CM. The level of data privacy is roughly equivalent to that provided by dedicated line network access
services such as analog modems or digital subscriber lines (DSL). BPI provides basic protection of
service, ensuring that a CM, uniquely identified by its MAC address, can obtain keying material for
services only it is authorized to access.
Note Encryption/decryption is subject to export licensing controls.
Note Because DOCSIS 1.0 BPI does not authenticate CMs, it does not protect against users employing cloned
CMs, masquerading as authorized CMs. Specific Cisco IOS releases provide protection against
spoofing, and support commands that can be used to configure source IP filtering on RF subnets to
prevent a user from using a source IP address that is not valid for the connected IP subnet.
BPI is defined as a set of extended services within the DOCSIS MAC sublayer. Refer to the DOCSIS
Baseline Privacy Interface Specification for detailed requirements.