System information

Configuring the CMTS
6-49
2. To verify the maximum number of hosts setting, use the show cable modem
hosts command in Privileged EXEC mode, as shown below:
MOT#show cable modem {<mac> | <prefix>} hosts
where:
mac is the CM MAC address.
prefix is the CM IP address.
The screen displays the current number of hosts connected to the CM, the
maximum number of hosts allowed for the CM, and the host CPE IP addresses
behind the CM.
Configuring Baseline Privacy
This section contains the tasks to configure Baseline Privacy (BPI). To encrypt
upstream and downstream data on an HFC network, you must configure BPI. BPI is
activated by default and, in most cases, the BPI parameter default values are
satisfactory. The optional tasks described in this section involve some parameters you
may choose to change. If a parameter default is satisfactory, you can ignore its
associated task.
You can set the Traffic Encryption Key (TEK) and Authorization Key (AK) for BPI.
The encryption is based on 40-bit or 56-bit Data Encryption Standard (DES)
algorithms.
You can set the TEK to expire based on a grace-time value or a lifetime value. A
grace-time key assigns a temporary key to a CM to access the network. A lifetime key
assigns a more permanent key to a CM. Each CM that has an assigned lifetime key
requests a new lifetime key from the cable interface before the current key expires.
Note: The configuration and activation of BPI depend on the cable operator
physical plant.