0% found this document useful (0 votes)
190 views3,060 pages

Cmts 12 2sc SCG Cisco

cisco

Uploaded by

Hamza Asim Ghazi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
190 views3,060 pages

Cmts 12 2sc SCG Cisco

cisco

Uploaded by

Hamza Asim Ghazi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3060

Cisco IOS CMTS Cable Software

Configuration Guide
Cisco IOS Release 12.2SC

Cisco Systems, Inc.


www.cisco.com

Cisco has more than 200 offices worldwide.


Addresses, phone numbers, and fax numbers
are listed on the Cisco website at
www.cisco.com/go/offices.
Cisco CMTS Router Basics
Cisco IOS Release 12.2SC

Cisco Systems, Inc.


www.cisco.com

Cisco has more than 200 offices worldwide.


Addresses, phone numbers, and fax numbers
are listed on the Cisco website at
www.cisco.com/go/offices.

Text Part Number: OL-27604-01


THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at
www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1005R)

Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.

Book Title
© 2009-2013 Cisco Systems, Inc. All rights reserved.
CONTENTS

Configuring the Cisco uBR10012 Universal Broadband Router for the First Time 1

Preparing for Configuration 2

Understanding Cisco uBR10012 Router Configuration Fundamentals 3

Configuring the Cisco uBR10012 Router Using AutoInstall 7

Configuring the Cisco uBR10012 Router Using the Setup Facility 8

Configuring the Cisco uBR10012 Router Manually Using Configuration Mode 13


Removing the Cable Interfaces 14

Configuring the Cable Interface with the Extended Setup Facility 16

Saving Your Configuration Settings 18

Reviewing Your Settings and Configurations 19

Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time 23

Configuration Fundamentals for the Cisco uBR7200 Series Routers 24

Configuring the Cisco uBR7200 Series Router Using AutoInstall 31

Configuring the Cisco uBR7200 Series Router Using the Setup Facility 40

Removing the Cable Interfaces 45

Configuring the Cable Interface with the Extended Setup Facility 49

Configuring the Cisco uBR7200 Series Router Manually Using Configuration Mode 52

Saving Your Configuration Settings 53


Reviewing Your Settings and Configurations 53

Performing OIR of Cable Interface Line Cards on the Cisco CMTS Routers 57

Finding Feature Information 57

OIR of Cable Interface Line Cards on the Cisco uBR7200 Series Universal Broadband Routers 57

OIR of Cable Interface Line Cards on the Cisco uBR10012 Universal Broadband Router 58

Unique Device Identifier Retrieval for the Cisco CMTS 61

Contents 61

Prerequisites for Unique Device Identifier Retrieval 62

Information About Unique Device Identifier Retrieval 62

How to Retrieve the Unique Device Identifier 63

Configuration Examples for Unique Device Identifier Retrieval 69

Cisco CMTS Router Basics


OL-27604-01 iii
Contents

Additional References 69

Command Reference 70

Cisco CMTS Router Basics


iv OL-27604-01
Configuring the Cisco uBR10012 Universal
Broadband Router for the First Time

First Published: February 14, 2008


Last Updated: February 9, 2009

This chapter describes how to start up and configure the Cisco uBR10012 Universal Broadband Router
as a Cable Modem Termination System (CMTS) for the first time. This chapter contains the following
sections:

Section Purpose
“Preparing for Configuration” Identifies tasks and analysis that you must complete prior to
section on page 2 powering on and configuring the Cisco uBR10012 router.
“Understanding Describes the basic principles of using passwords and
Cisco uBR10012 Router summarizes the initial router configuration utilities that are
Configuration Fundamentals” available to you. The remainder of this chapter provides
section on page 3 instructions for each utility.
“Configuring the Describes how to use the AutoInstall process, which is designed
Cisco uBR10012 Router Using to configure the Cisco uBR10012 router automatically after
AutoInstall” section on page 7 connection to your WAN.
“Configuring the Describes how to use the Setup facility (also called the System
Cisco uBR10012 Router Using the Configuration dialog) for configuring your CMTS, an
Setup Facility” section on page 8 alternative to AutoInstall. The Setup facility supports several
functions so that cable interfaces and cable interface line cards
are fully operational (after initial setup). Use the Setup facility
prior to completing a WAN or LAN connection to your router.
“Configuring the Describes how to configure the Cisco uBR10012 router
Cisco uBR10012 Router Manually manually if you prefer not to use the Setup or AutoInstall
Using Configuration Mode” section facilities.
on page 13
“Removing the Cable Interfaces” Describes how to reset and remove the interfaces on the Cisco
section on page 14 uBR10012 router.

Cisco Systems, Inc.


www.cisco.com
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Preparing for Configuration

Section Purpose
“Configuring the Cable Interface Provides instructions for using the Setup facility to create an
with the Extended Setup Facility” initial configuration. The extended setup prompts you to
section on page 16 configure each interface on the system.
“Reviewing Your Settings and Provides commands to check your settings and review any
Configurations” section on page 19 changes to your configuration.

Preparing for Configuration


Complete these prerequisite steps before you power on and configure the Cisco uBR10012 router:
• Ensure that your network supports reliable broadband data transmission. Your plant must be swept,
balanced, and certified based on National Television Standards Committee (NTSC) or appropriate
international cable plant recommendations. Ensure your plant meets all Data-over-Cable Service
Interface Specifications (DOCSIS) downstream and upstream radio frequency (RF) requirements.
• Ensure that your Cisco uBR10012 router is installed according to the instructions in the hardware
installation guide that came with your CMTS.
• Ensure that all other required headend or distribution hub routing and network interface equipment
is installed, configured, and operational (based on the supported services). This includes:
– All routers
– Servers (Dynamic Host Configuration Protocol (DHCP) servers, Trivial File Transfer Protocol
(TFTP) servers, and time-of-day (ToD) servers)
– Network management systems
– Other configuration or billing systems
• Ensure that DHCP and DOCSIS configuration files have been created and pushed to appropriate
servers so that each CM, when initialized, can:
– Transmit a DHCP request
– Receive an IP address
– Obtain TFTP and ToD server addresses
– Download a DOCSIS configuration file (or updated software image if using Cisco uBR924
cable access routers or Cisco uBR910 cable data service units (DSUs) in your network)
• Ensure that customer premises equipment (CPE)—CMs or set-top boxes (STBs), PCs, telephones,
or facsimile machines—meet requirements for your network and service offerings.
• Be familiar with your channel plan to assign appropriate frequencies. Outline your strategies for
setting up bundling, if applicable to your headend or distribution hub. As appropriate, obtain:
– Passwords
– IP addresses
– Subnet masks
– Device names
After these prerequisites are met, you are ready to configure the Cisco uBR10012 router. This includes,
at a minimum:
• Configuring a host name and password for the Cisco uBR10012 router

Cisco CMTS Router Basics


2
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Understanding Cisco uBR10012 Router Configuration Fundamentals

• Configuring the CMTS to support IP over the cable plant and network backbone

Caution If you plan to use service-class-based provisioning, the service classes must be configured at the CMTS
before CMs attempt to make a connection.

Understanding Cisco uBR10012 Router Configuration


Fundamentals
This section describes the basic parameters of using passwords.

Note These sections provide minimal configuration instructions. For additional configuration information,
refer to subsequent chapters in this guide. For examples of Cisco uBR10000 series CMTS configuration
files, refer to the “Viewing Sample Configuration Files” section on page 19.

Tip Be sure that you have appropriate addresses and values based on your network before you attempt to
configure the router. Enter the show version command to display the release of Cisco IOS software on
your router.

Using the Enable Secret and the Enable Passwords


The Cisco uBR10012 router is administered using the Cisco command interpreter, called the EXEC. You
must boot and log in to the router before you can enter an EXEC command.

Step 1 Connect a terminal to the I/O controller console port of the Cisco uBR10012 router and establish a
terminal session. You can open a Terminal application (Hyper Terminal) on a PC as follows:
a. Connect using: Direct to Com 1
b. Set bits per second: 9600
c. Set data bits: 8
d. Set parity: none
e. Set stop bit: 1
f. Set flow control: none
Step 2 Power on the Cisco uBR10000 series. Enter no to choose the normal operating mode of the router. The
user EXEC prompt appears:
Would you like to enter the initial dialog?[yes]: no
Router>

Cisco CMTS Router Basics


3
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Understanding Cisco uBR10012 Router Configuration Fundamentals

Setting Password Protection

Note For security purposes, the EXEC has two levels of access to commands: user EXEC mode and privileged
EXEC mode. The commands available at the user level are a subset of those available at the privileged
level.

Tip Because many privileged-level EXEC commands are used to set operating parameters, password-protect
these commands to prevent unauthorized use.

At the EXEC prompt, enter one of the following two commands to set password protection:
• enable secret password (which is a very secure, encrypted password)
• enable password (which is a less secure, nonencrypted password)
To gain access to privileged-level commands, enter the desired password.

Note An enable secret password can contain from 1 to 25 uppercase and lowercase alphanumeric characters.
An enable password can contain any number of uppercase and lowercase alphanumeric characters. A
number cannot be the first character. Spaces are valid password characters; for example, “two words” is
a valid password. Leading spaces are ignored. Trailing spaces are recognized. Alphanumeric characters
are recognized as uppercase or lowercase.

Passwords should be different for maximum security. If you enter the same password for both during the
setup script, the system accepts it, but you receive a warning message indicating that you should enter a
different password.

Replacing or Recovering a Lost Password


This section describes how to recover a lost enable or console login password and how to replace a lost
enable secret password on your Cisco uBR10012 router.

Note It is possible to recover the enable or console login password. The enable secret password is encrypted,
however, and must be replaced with a new enable secret password.

Overview of the Password Recovery Process

Following is an overview of the general steps in the password recovery procedure:

Step 1 If you can log in to the router, enter the show version command to determine the existing configuration
register value.
Step 2 Press the Break key to get to the bootstrap program prompt (ROM monitor). You might need to reload
the system image by power cycling the router.
Step 3 Change the configuration register so that the following functions are enabled:
• Break
• Ignore startup configuration

Cisco CMTS Router Basics


4
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Understanding Cisco uBR10012 Router Configuration Fundamentals

• Boot from Flash memory

Note The key to recovering a lost password is to set the configuration register bit 6 (0x0040) so that
the startup configuration (usually in NVRAM) is ignored. This allows you to log in without
using a password and to display the startup configuration passwords. Cisco recommends setting
the configuration register to 0x142.

Step 4 Power cycle the router by turning power off and then back on.
Step 5 Log in to the router and enter the privileged EXEC mode.
Step 6 Enter the show startup-config command to display the passwords.
Step 7 Recover or replace the displayed passwords.
Step 8 Change the configuration register back to its original setting.

Note To recover a lost password if Break is disabled on the router, you must have physical access to the router.

Replacing or Recovering Passwords

Complete the following steps to recover or replace a lost enable, enable secret, or console login
password:

Step 1 Attach an ASCII terminal to the console port on your Cisco uBR10012 router.
Step 2 Configure the terminal to operate at 9600 baud, 8 data bits, no parity, and 2 stop bits.
Step 3 If you can log in to the router as a nonprivileged user, enter the show version command to display the
existing configuration register value. Note the value for later use. If you cannot log in to the router at all,
continue with the next step.
Step 4 Press the Break key or send a Break from the console terminal.
• If Break is enabled, the router enters the ROM monitor, indicated by the ROM monitor prompt
(rommon n>), where n is the number of the command line. Proceed to Step 6.
• If Break is disabled, power cycle the router (turn the router off or unplug the power cord, and then
restore power). Proceed to Step 5.
Step 5 Within 60 seconds of restoring the power to the router, press the Break key or send a Break. This action
causes the router to enter the ROM monitor and display the ROM monitor prompt (rommon 1>).
Step 6 To set the configuration register on a Cisco uBR10012 router, use the configuration register utility by
entering the confreg command at the ROM monitor prompt as follows:
rommon 1> confreg

Answer yes to the enable ignore system config info? prompt and note the current configuration
register settings.
Step 7 Initialize the router by entering the reset command as follows:
rommon 2> reset

The router initializes, the configuration register is set to 0x142, the router boots the system image from
Flash memory and enters the System Configuration dialog (setup), as follows:

Cisco CMTS Router Basics


5
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Understanding Cisco uBR10012 Router Configuration Fundamentals

--- System Configuration Dialog --


Step 8 Enter no in response to the System Configuration dialog prompts until the following message appears:
Press RETURN to get started!

Step 9 Press Return. The user EXEC prompt appears as follows:


Router>

Step 10 Enter the enable command to enter privileged EXEC mode.


Step 11 Enter the show startup-config command to display the passwords in the configuration file as follows:
Router# show startup-config

Step 12 Scan the configuration file display looking for the passwords; the enable passwords are usually near the
beginning of the file, and the console login or user EXEC password is near the end. The passwords
displayed will look something like this:
enable secret 5 $1$ORPP$s9syZt4uKn3SnpuLDrhuei
enable password 23skiddoo
.
.
line con 0
password onramp

Note The enable secret password is encrypted and cannot be recovered; it must be replaced. The enable and
console passwords can be encrypted text or clear text.

Proceed to the next step to replace an enable secret, console login, or enable password. If there is no
enable secret password, note the enable and console login passwords if they are not encrypted and
proceed to Step 17.

Caution Do not perform the next step unless you have determined that you must change or replace the enable,
enable secret, or console login passwords. Failure to follow the steps as presented here could cause your
router configuration to be erased.

Step 13 Enter the configure memory command to load the startup configuration file into running memory. This
action allows you to modify or replace passwords in the configuration.
Router# configure memory

Step 14 Enter the configure terminal command for configuration mode:


Router# configure terminal

Step 15 To change all three passwords, enter the following commands:


Router(config)# enable secret newpassword1
Router(config)# enable password newpassword2
Router(config)# line con 0
Router(config)# password newpassword3

Change only the passwords necessary for your configuration. You can remove individual passwords by
using the no form of the previous commands. For example, entering the no enable secret command
removes the enable secret password.
Step 16 You must configure all interfaces to not be administratively shut down as follows:

Cisco CMTS Router Basics


6
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Configuring the Cisco uBR10012 Router Using AutoInstall

Router(config)# interface fast ethernet 0/0/0


Router(config)# no shutdown

Enter the equivalent commands for all interfaces that were originally configured. If you omit this step,
all interfaces are administratively shut down and unavailable when the router is restarted.
Step 17 Use the config-register command to set the configuration register to the original value noted in Step 3
or Step 7.
Step 18 Press Ctrl-Z or type end to exit configuration mode:
Router(config)# end

Caution Do not perform the next step unless you have changed or replaced a password. If you have skipped
Step 13 through Step 16 previously, then proceed now to Step 20. Failure to observe this sequence
causes the system to erase your router configuration file.

Step 19 Enter the copy running-config startup-config command to save the new configuration to nonvolatile
memory:
Router# copy running-config startup-config

Step 20 Enter the reload command to reboot the router:


Router# reload

Step 21 Log in to the router with the new or recovered passwords.

Configuring the Cisco uBR10012 Router Using AutoInstall


The AutoInstall process is designed to configure the Cisco uBR10012 router automatically after
connection to your WAN.
For AutoInstall to work properly, a TCP/IP host on your network must be preconfigured to provide the
required configuration files. The TCP/IP host can exist anywhere on the network as long as the following
conditions are maintained:
• The host must be on the LAN or WAN side of the router’s line card connection to the WAN.
• The User Datagram Protocol (UDP) broadcasts to and from the router.
• The TCP/IP host is enabled.
This functionality is coordinated by your system administrator at the site where the TCP/IP host is
located. You should not use AutoInstall unless the required files are available on the TCP/IP host. Refer
to the following publications for more information about AutoInstall:
• Cisco IOS Configuration Fundamentals Configuration Guide, Release 12.2 at
http://www.cisco.com/en/US/docs/ios/12_2/configfun/configuration/guide/ffun_c.html
• Cisco IOS Configuration Fundamentals Command Reference, Release 12.2 at
http://www.cisco.com/en/US/docs/ios/fundamentals/command/reference/cf_book.html

Cisco CMTS Router Basics


7
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Configuring the Cisco uBR10012 Router Using the Setup Facility

Preparing for the AutoInstall Process


Complete the following steps to prepare your Cisco uBR10012 router for the AutoInstall process:

Step 1 Attach the appropriate synchronous serial cable to the synchronous serial interface 0 on the router.
Step 2 Turn the power switch on each power supply to the ON (|) position. This action turns on power to the
router.
The router loads the operating system image from Flash memory; this process can take several minutes.
If the remote end of the WAN connection is connected and properly configured, the AutoInstall process
begins.
Step 3 When the AutoInstall process is completed, use the copy running-config startup-config command to
write the configuration data to the router’s nonvolatile random-access memory (NVRAM):
Router# copy running-config startup-config

Completing this step saves the configuration settings that the AutoInstall process created to NVRAM. If
you fail to do this, your configuration will be lost the next time you reload the router.

Configuring the Cisco uBR10012 Router Using the Setup Facility


The Cisco uBR10000 series Setup facility (also called the System Configuration dialog) is a useful and
efficient tool for configuring your CMTS. The Setup facility supports the following functions so that
cable interfaces and cable interface line cards are fully operational (after initial setup):
• Cable-specific commands
• Upstream frequency definition
For each cable interface, the following information is mandatory:
Per upstream:
cable upstream n frequency f
no cable upstream n shutdown

Options include definition of the following information:


• DHCP server address.
• Options are also provided to set downstream frequency for the upconverter per interface.
If you do not plan to use AutoInstall, do not connect the router’s WAN or LAN cable to the channel
service unit (CSU) and data service unit (DSU). If the WAN or LAN cable is connected to the CSU and
DSU and the router does not have a configuration stored in NVRAM, the router attempts to run
AutoInstall at startup.

Tip The router might take several minutes to determine that AutoInstall is not set up to a remote TCP/IP host.
When the router determines that AutoInstall is not configured, it defaults to the Setup facility. If the LAN
or WAN cable is not connected, the router boots from Flash memory and automatically runs the Setup
facility.

Cisco CMTS Router Basics


8
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Configuring the Cisco uBR10012 Router Using the Setup Facility

Note You can run the Setup facility when the enable prompt (#) is displayed, by entering the setup command
in privileged EXEC mode.

Configuring Global Parameters


When you first start the program, configure the global parameters to control system-wide settings:

Step 1 Connect a console terminal to the console port on the I/O controller, and then boot the router.
Step 2 After booting from Flash memory, the following information appears after about 30 seconds. When you
see this information, you have successfully booted your router:
Restricted Rights Legend

Use, duplication, or disclosure by the Government is


subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.


170 West Tasman Drive
San Jose, California 95134-1706

Cisco Internetwork Operating System Software


IOS (tm) 10000 Software (UBR10K-P6-M), Version 12.2(2)XF
TAC Support: http://www.cisco.com/cgi-bin/ibld/view.pl?i=support
Copyright (c) 1986-2001 by Cisco Systems, Inc.
Compiled Fri 20-Jul-01 16:15 by test
Image text-base: 0x60008960, data-base: 0x612E0000

cisco uBR10000 (PRE-RP) processor with 98304K/32768K bytes of memory.


Processor board ID TBA05080458
R7000 CPU at 262Mhz, Implementation 39, Rev 2.1, 256KB L2, 2048KB L3 Cache
Backplane version 1.0, 8 slot

Last reset from unexpected value


Toaster processor tmc0 is running.
Toaster processor tmc1 is running.
1 Ethernet/IEEE 802.3 interface(s)
1 FastEthernet/IEEE 802.3 interface(s)
509K bytes of non-volatile configuration memory.

46976K bytes of ATA PCMCIA card at slot 0 (Sector size 512 bytes).
32768K bytes of Flash internal SIMM (Sector size 256KB).

Press RETURN to get started!

Note The first two sections of the configuration script, the banner and the installed hardware, appear only at
initial system startup. On subsequent uses of the Setup facility, the script begins with the following
prompt.

--- System Configuration Dialog ---


Continue with configuration dialog? [yes/no]: yes

Cisco CMTS Router Basics


9
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Configuring the Cisco uBR10012 Router Using the Setup Facility

At any point you may enter a question mark '?' for help.
Use ctrl-c to abort configuration dialog at any prompt.
Default settings are in square brackets '[]'.

Basic management setup configures only enough connectivity


for management of the system, extended setup will ask you
to configure each interface on the system

Step 3 When asked if you want to continue with the System Configuration dialog and enter basic management
setup (displays the current interface summary), enter yes or press Return:
Continue with configuration dialog? [yes/no]: yes
.
.
.
Would you like to enter basic management setup? [yes/no]: yes

The interface summary appears, showing the state of configured and unconfigured interfaces.
Step 4 Choose which protocols to support on your interfaces. For IP-only installations, you can accept the
default values for most of the questions. A typical configuration using IP follows and continues through
Step 7:
Configuring global parameters:

Enter host name [Router]: router

Step 5 Enter the enable secret password, the enable password, and the virtual terminal password:
The enable secret password is a one-way cryptographic secret
password used instead of the enable password when it exists.

Enter enable secret: ******

The enable password is used when there is no enable secret


password and when using older software and some boot images.

Enter enable password: ******

Enter virtual terminal password: ******

Step 6 The Simple Network Management Protocol (SNMP) is the most widely supported open standard for
network management. SNMP provides a means to access and set configuration and run-time parameters
of routers and communication servers. SNMP also defines a set of functions that can be used to monitor
and control network elements.
Enter yes to accept SNMP management; enter no to refuse it:
Configure SNMP Network Management? [no]:
Community string [public]:

Step 7 In all cases, you will use IP routing. When you are using IP routing, select an interior routing protocol.
You can specify one of only two interior routing protocols to operate on your system using the Setup
facility, either Interior Gateway Routing Protocol (IGRP) or Routing Information Protocol (RIP).
To configure IP routing, enter yes (the default) or press Return, and then select an interior routing
protocol:
Configure IP? [yes]:
Configure IGRP routing? [yes]:
Your IGRP autonomous system number [1]: 15
Step 8 Configure your line card interface parameters. The following example shows how an 8-port Ethernet line
card is installed in line card slot 3. The Setup facility determines the status of all interfaces.

Cisco CMTS Router Basics


10
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Configuring the Cisco uBR10012 Router Using the Setup Facility

To configure each active interface port for IP, enter yes (the default) or press Return. For all inactive
ports, the default is no. You can press Return to accept the default.
Configuring interface Ethernet 1/0:
Is this interface in use? [yes]:
Configure IP on this interface? [yes]:
IP address for this interface [19.2.22.4]:
Number of bits in subnet field [8]:
Class A network is 19.0.0.0, 8 subnet bits; mask is /16

Configuring interface Ethernet1/1:


Is this interface in use? [no]:

Configuring interface Ethernet1/2:


Is this interface in use? [no]:

Configuring interface Ethernet1/3:


Is this interface in use? [no]:

Configuring interface Ethernet1/4:


Is this interface in use? [no]:

Configuring interface Ethernet1/5:


Is this interface in use? [no]:

Configuring interface Ethernet1/6:


Is this interface in use? [no]:

Configuring interface Ethernet1/7:


Is this interface in use? [no]:

Step 9 Configure your cable interface. The following example shows a Cisco uBR10012 router with cable
interface. The Setup facility, for the most part, determines the status of all interfaces.
To configure each active interface port, enter yes (the default) or press Return. For all inactive ports, the
default is no. You can press Return to accept the default.
Configuring interface cable 5/0/0:
Is this interface in use? [yes]:
Configure this interface? [yes]:
IP address for this interface [19.2.22.5]:
Number of bits in subnet field [8]:
Class A network is 19.0.0.0, 8 subnet bits; mask is /16

Configuring interface cable 1/1:


Is this interface in use? [yes]:
Configure this interface? [yes]:
IP address for this interface [19.2.22.6]:
Number of bits in subnet field [8]:
Class A network is 19.0.0.0, 8 subnet bits; mask is /16

The configuration program displays the newly created command interface script:
The following command script was created:

hostname router
enable secret 5 $1$f0fc$A38P/KN/9yD3sEKSt6hKQ/
enable password betty
line vty 0 4
password wilma
snmp-server community public
!
ip routing
!

Cisco CMTS Router Basics


11
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Configuring the Cisco uBR10012 Router Using the Setup Facility

interface cable 5/0/0


ip address 19.2.22.5 255.255.0.0

router igrp 15
network 19.0.0.0
!
end

Step 10 When asked if you want to use this configuration, enter yes or press Return.
Use this configuration? [yes/no]: yes

Step 11 Save your settings to NVRAM. (Refer to the “Configuring the Cable Interface with the Extended Setup
Facility” section on page 16.)

Note You must always manually save the configuration settings to NVRAM whenever they are modified.

Configuring Upstream Frequencies


Upstream parameters must be configured manually. After the Setup facility is run, upstream ports have
a default state of “shutdown.” You have two methods to configure upstream channel frequencies:
• Configure a fixed frequency between 5 to 42 MHz for North American channel plans, and enable
the upstream port.
• Create a global spectrum group, assign the interface to it, and enable the upstream port.
The cable interface card receiver accepts time-division multiplexed burst transmissions from
cable interfaces (or CMs in set-top boxes), which are DOCSIS-based. The upstream port becomes “up”
when it is assigned an upstream frequency and is configured to be administratively up.
The upstream port is frequency-agile. The frequency can change while the interface is up and carrying
traffic, if you define spectrum groups per the example provided.

Configuring Individual Upstream Modulation Profiles


You can define individual modulation profiles. A modulation profile consists of a table of physical layer
characteristics for the different types of upstream bursts such as initial maintenance, long grant, request
data, request, short grant, and station maintenance.

Note Only qualified personnel should define upstream modulation profiles.

Complete these steps to activate upstream interfaces:

Step 1 After the Setup facility has initially configured noncable interfaces on the Cisco uBR10012 router, enter
the enable command and your password (privileged EXEC).
Step 2 Enter the configure terminal command to get into global configuration mode.
Step 3 In global configuration mode, configure modulation profiles and spectrum groups for your
Cisco uBR10012 router using the cable modulation-profile and cable spectrum-group commands.

Cisco CMTS Router Basics


12
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Configuring the Cisco uBR10012 Router Manually Using Configuration Mode

Step 4 In cable interface configuration mode, configure various characteristics for the interface in question,
using the cable upstream commands.

Configuring the Cisco uBR10012 Router Manually Using


Configuration Mode
You can configure the Cisco uBR10012 router manually if you prefer not to use the Setup facility or
AutoInstall. Complete the following steps:

Step 1 Connect a console terminal to the console port on the I/O controller.
Step 2 When asked if you want to enter the initial dialog, answer no to go into the normal operating mode of
the router:
Would you like to enter the initial dialog? [yes]: no

Step 3 After a few seconds, the user EXEC prompt (Router>) appears. Type enable to enter enable mode
(configuration changes can be made only in enable mode):
Router> enable

The prompt changes to the enable mode (also called privileged EXEC) prompt:
Router#

Step 4 Enter the configure terminal command at the enable prompt to enter configuration mode from the
terminal:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#

Tip To see a list of the configuration commands available to you, enter ? at the prompt or type help while in
configuration mode.

Step 5 At the Router(config)# prompt, enter the interface type slot/port command to enter the interface
configuration mode:
Router(config)# interface cable slot/port
Router(config-if)#

Step 6 Set the downstream center frequency to reflect the digital carrier frequency of the downstream RF carrier
(the channel) for the downstream port:
Router(config-int)# cable downstream frequency down-freq-hz

Note This command has no effect on the external upconverter. It is informational only.

Step 7 Activate the downstream port on the cable interface line card to support digital data transmission over
the hybrid fiber-coaxial network:
Router(config-int)# no shutdown

Step 8 Enter the fixed center frequency in Hz for your downstream RF carrier and the port number:

Cisco CMTS Router Basics


13
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Removing the Cable Interfaces

Router(config-int)# cable upstream port frequency up-freq-hz

Note Be sure not to select an upstream frequency that interferes with that used for any other upstream
application in your cable plant.

Step 9 Repeat Step 8 for each upstream port on the cable interface line card.
Step 10 Activate the upstream port:
Router(config-int)# no cable upstream port shutdown

Step 11 Repeat Step 10 to activate each port used on your cable interface line card.
Step 12 Exit to return to the configuration mode:
Router(config-if)# exit
Router(config)#

Step 13 Enter the next interface to configure, following Step 6 through Step 12, or type exit to return to enable
mode.
Router(config)# exit
Router#
%SYS-5-CONFIG_I: Configured from console by console#

Step 14 Save the configuration to NVRAM:


Router# copy running-config startup-config

Removing the Cable Interfaces


This section shows you how to reset the current interface configuration and remove the interface.

Removing the Wideband Cable Interface


To remove or delete a wideband cable interface, do the following:

Step 1 Reset the configuration of the interface back to its default values using the default command in global
configuration mode.
Router(config)# default interface wideband-Cable slot/{subslot |
bay}/port:wideband-channel

Step 2 Enter the wideband cable interface configuration mode.


Router(config)# interface wideband-Cable slot/{subslot | bay}/port:wideband-channel

Step 3 Shut down the wideband cable interface.


Router(config-if) shutdown

Step 4 Exit the wideband cable interface configuration mode.


Router(config-if) exit

Cisco CMTS Router Basics


14
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Removing the Cable Interfaces

Step 5 Exit the global configuration mode.


Router(config) exit

Removing the Integrated Cable Interface


To remove or delete an integrated cable interface, do the following:

Step 1 Reset the configuration of the interface back to its default values using the default command in global
configuration mode.
Router(config)# default interface Integrated-Cable slot/subslot/port:rf-channel

Step 2 Enter the integrated cable interface configuration mode.


Router(config)# interface Integrated-Cable slot/subslot/port:rf-channel

Step 3 Shut down the integrated cable interface.


Router(config-if) shutdown

Step 4 Exit the integrated cable interface configuration mode.


Router(config-if) exit

Step 5 Exit the global configuration mode.


Router(config) exit

Removing the Modular Cable Interface


To remove or delete a modular cable interface, do the following:

Step 1 Reset the configuration of the interface back to its default values using the default command in global
configuration mode.
Router(config)# default interface Modular-Cable slot/{subslot | bay}/port:interface-number

Step 2 Enter the modular cable interface configuration mode.


Router(config)# interface Modular-Cable slot/{subslot | bay}/port:interface-number

Step 3 Shut down the modular cable interface.


Router(config-if) shutdown

Step 4 Exit the modular cable interface configuration mode.


Router(config-if) exit

Step 5 Exit the global configuration mode.


Router(config) exit

Cisco CMTS Router Basics


15
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Configuring the Cable Interface with the Extended Setup Facility

Configuring the Cable Interface with the Extended Setup Facility


The Setup facility creates an initial configuration. The basic management setup configures only enough
connectivity for management of the system. The Extended Setup facility prompts you to configure each
interface on the system.
To invoke the configuration facility, use the following command:
Router# setup

The following is the System Configuration dialog:


Continue with configuration dialog? [yes/no]: yes

MAC-Layer Addressing
The MAC-layer or hardware address is a standardized data link layer address required for certain
network interface types. These addresses are not used by other devices in the network; they are unique
to each port. The Cisco uBR10012 router uses a specific method to assign and control the MAC-layer
addresses for line cards.
All LAN interfaces (ports) require unique MAC-layer addresses, also known as hardware addresses.
Typically, the MAC address of an interface is stored on a memory component that resides directly on the
interface circuitry; however, the online insertion and removal (OIR) feature requires a different method.
The OIR feature lets you remove a line card and replace it with another identically configured one. If the
new line card matches the line card you removed, the system immediately brings it online.
To support OIR, an address allocator with a unique MAC address is stored in an EEPROM on the
Cisco uBR10012 router midplane. Each address is reserved for a specific port and slot in the router
regardless of whether a line card resides in that slot.

Caution When hot swapping a line card with a different type of interface, you might have to reconfigure the
interfaces. Refer to the hardware installation guide that ships with your CMTS or to the appropriate
field-replaceable unit (FRU) document for more specific information regarding OIR.

The MAC addresses are assigned to the slots in sequence. This address scheme allows you to remove
line cards and insert them into other Cisco uBR10012 router without causing the MAC addresses to
move around the network or be assigned to multiple devices.
Storing the MAC addresses for every slot in one central location means that the addresses stay with the
memory device on which they are stored.

Identifying the Cable Interface Line Card

Identifying CM Line Cards


The following Cisco cable interfaces can be installed in a Cisco CMTS:
• The Cisco uBR10012 router supports one downstream modulator and one upstream demodulator.
– The Cisco uBR10012 router supports the following defaults: QAM-256 at 40 MBps
downstream, and QAM-16 at 5 Mbps upstream.

Cisco CMTS Router Basics


16
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Configuring the Cable Interface with the Extended Setup Facility

– The card supports upstream channel widths of 200 kHz, 400 kHz, 800 kHz, 1.6 MHz, and
3.2 MHz.
– The card outputs +42 dBmV and +/- 2 dBmV.
– The downstream modulator has both an RF output, using the integrated upconverter, and an
intermediate frequency (IF) output, which must be connected to an external upconverter.

Identifying CM Line Card Slots


On the Cisco uBR10012 router, the cable interface line card is fixed and is always slot 1. To display
information about a specific cable interface slot’s downstream channel, use the show interfaces cable
command with the CM card’s slot number and downstream port number in the following format:
show interfaces cable slot/downstream-port [downstream]

Use the slot number and downstream port number to display information about a downstream interface.
You can abbreviate the command to sh int c. The following example shows the display for upstream
channel port 0 on a Cisco uBR10012 router:
Router# sh int c 5/0/0

To display information about a specific cable interface slot’s upstream channel, use the
show interfaces cable command. Include these CM card parameters:
• Slot number
• Downstream port number
• Upstream port number
Use this format:
show interfaces cable slot/downstream-port [upstream] upstream-port

Use the slot number, downstream port number, and upstream port number to display information about
an upstream interface. You can abbreviate the command to sh int c.
The following example shows the display for upstream channel port 0 in cable interface slot 3 of a
Cisco uBR10012 router that is turned up:
Router# sh int c3/0/0 upstream

Configuring Global Parameters


Step 1 Access the host by responding to the following prompt: Enter host name [cmts]:
Step 2 The enable secret password is used to protect access to privileged EXEC and configuration modes. This
password, after entered, becomes encrypted in the configuration.
Respond to this prompt: Enter enable secret [Use current secret]: aa

Next, the enable password is used when you do not specify an enable secret password, with some older
software versions, and some boot images.
Step 3 Respond to this prompt: Enter enable password [rHoz]: bb
Next, use the virtual terminal password to protect access to the router over a network interface.
Step 4 Respond to this prompt: Enter virtual terminal password [cc]: cc

Cisco CMTS Router Basics


17
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Saving Your Configuration Settings

The following system information appears.


Configure SNMP Network Management? [no]:
Configure IP? [yes]:
Configure IGRP routing? [yes]:
Your IGRP autonomous system number [1]:
Configure CLNS? [no]:
Configuring interface parameters:
Do you want to configure FastEthernet0/0 interface? [yes]:
Use the 100 Base-TX (RJ-45) connector? [yes]:
Operate in full-duplex mode? [no]:
Configure IP on this interface? [yes]: no
Do you want to configure Ethernet1/0 interface? [yes]: n
Do you want to configure Cable5/0/0 interface? [yes]:
Downstream setting frequency : 531000000
For cable upstream [0]
Shut down this upstream ? [yes/no]: no
Frequency : 33808000
Would you like to configure the DHCP server ? [yes/no]: yes
IP address for the DHCP server
[X.X.X.X]: 10.0.0.2
Configure IP on this interface? [no]: yes
IP address for this interface: 10.20.133.65
Subnet mask for this interface [255.0.0.0] : 255.255.255.248
Class A network is 10.0.0.0, 29 subnet bits; mask is /29

The following configuration command script is created:


interface cable5/0/0
ip address 10.20.133.65 255.255.255.248
no ip mroute-cache
no keepalive
cable insertion-interval 500
cable downstream annex B
cable downstream modulation 64qam
cable downstream interleave-depth 32
cable downstream frequency 531000000
cable upstream 0 frequency 33808000
cable upstream 0 power-level 0
no cable upstream 0 shutdown
cable helper-address 10.0.0.2

Note For modems to acquire an IP address, they must have direct access to DHCP, TFTP, or ToD servers, or
have a static route set.

Saving Your Configuration Settings


To store the configuration or changes to your startup configuration in NVRAM, enter the
copy running-config startup-config command at the Router# prompt:
Router# copy running-config startup-config

This command saves the configuration settings you set using configuration mode, the Setup facility, or
AutoInstall.

Cisco CMTS Router Basics


18
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Reviewing Your Settings and Configurations

Tip If you do not save your settings, your configuration will be lost the next time you reload the router.

Reviewing Your Settings and Configurations


You can check your settings and review any changes to your configuration using various software
commands.
• To view information specific to the hardware and cable interface configuration on your
Cisco uBR10012 router, use show commands.
– Use this command to verify the downstream center frequency:
Router# show controllers cable slot/port downstream

– Use this command to verify the current value of an upstream port frequency:
Router# show controllers cable slot/port upstream

– Use this command to check the value of the settings you entered:
Router# show running-config

• To review changes you make to the configuration, use the EXEC show startup-config command to
display the information stored in NVRAM.

Viewing Sample Configuration Files


This section provides examples of Cisco uBR10012 router configuration files. To view the current
configuration of a Cisco uBR10012 router, enter the show running-config command at the
command-line interface (CLI) prompt in EXEC mode or privileged EXEC mode.

Baseline Privacy Interface Configuration Files


The Cisco uBR10000 series CMTS supports 56-bit and 40-bit encryption and decryption; 56 bit is the
default. After you choose a CMTS image that supports Baseline Privacy Interface (BPI), BPI is enabled
by default for the Cisco uBR10000 series CMTS. Key commands that appear in the
Cisco uBR10012 router configuration file that denote that encryption and decryption are supported
include:
• int cable 5/0/0
• cable privacy kek grace-time 800
• cable privacy kek life-time 750000
• cable privacy tek grace-time 800
• cable privacy tek life-time 56000
• cable privacy enable
• cable privacy mandatory

Note The cable interface must also support encryption and decryption.

Cisco CMTS Router Basics


19
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Reviewing Your Settings and Configurations

When Baseline Privacy is enabled, the Cisco uBR10012 router routes encrypted and decrypted packets
from a host or peer to another host or peer. BPI is configured with key encryption keys (KEKs) and traffic
encryption keys (TEKs). A KEK is assigned to a CM, based on the CM’s service identifier (SID), and
permits the CM to connect to the Cisco uBR10012 router when Baseline Privacy is activated. The TEK
is assigned to a CM when its KEK has been established. The TEK is used to encrypt data traffic between
the CM and the Cisco uBR10012 router.
KEKS and TEKs can be set for Baseline Privacy on the HFC network to expire based on a grace-time
or a life-time value, defined in seconds. A grace-time value assigns a temporary key to a CM to access
the network. A life-time value assigns a more permanent key to a CM. Each CM that has a life-time
value assigned requests a new lifetime key from the Cisco uBR10012 router before the current one
expires.
To set the duration in seconds for KEK or TEK grace-time or life-time, use the following commands
in global configuration mode. To restore the default values, use the no form of each command.
cable privacy kek {grace-time [seconds] | life-time [seconds]}
no cable privacy kek {grace-time | life-time}

cable privacy tek {grace-time [seconds] | life-time [seconds]}


no cable privacy tek {grace-time | life-time}

Syntax Description grace-time seconds (Optional) Length of key encryption grace-time in seconds. Valid range is
300 to 1800 seconds. The default grace-time value is 600 seconds.
life-time seconds (Optional) Length of the key encryption life-time in seconds.Valid range is
86,400 to 604,8000. The default life-time value is 604800 seconds.

Tip Use the show cable modem command to identify a CM with encryption and decryption enabled. The
online(pk) output of this command reveals a CM that is registered with BPI enabled and a KEK assigned.
The online(pt) output reveals a CM that is registered with BPI enabled and a TEK assigned.

Should you want to change the Cisco uBR10000 series default of 56-bit encryption and decryption to
40-bit, use the “40 bit DES” option:
Router(config-if)# cable privacy ?
40-bit-des select 40 bit DES
^^^^^^^^^^
authenticate-modem turn on BPI modem authentication
authorize-multicast turn on BPI multicast authorization
kek KEK Key Parms
mandatory force privacy be mandatory
tek TEK Key Parms

Software then generates a 40-bit DES key, where the DES key that is generated and returned masks the
first 16 bits of the 56-bit key to zero in software. To return to 56-bit encryption and decryption after
changing to 40-bit, enter the no command in front of the “40 bit des” option.

Cisco CMTS Router Basics


20
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Reviewing Your Settings and Configurations

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of
Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The
use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco CMTS Router Basics


21
Configuring the Cisco uBR10012 Universal Broadband Router for the First Time
Reviewing Your Settings and Configurations

Cisco CMTS Router Basics


22
Configuring the Cisco uBR7200 Series Universal
Broadband Routers for the First Time

First Published: February 14, 2008


Last Updated: February 9, 2009

This chapter describes how to start up and configure a Cisco uBR7200 series universal broadband router
as a Cable Modem Termination System (CMTS) for the first time. This chapter contains the following
sections:

Section Purpose
“Configuration Fundamentals Identifies tasks and analysis that you must complete prior to
for the Cisco uBR7200 Series powering on and configuring the Cisco uBR7200 series router. This
Routers” section on page 24 includes instructions for completing preconfiguration tasks and for
using password procedures.
“Configuring the Cisco Describes how to use the AutoInstall process, which is designed to
uBR7200 Series Router Using configure the Cisco uBR7200 series router automatically after
AutoInstall” section on page 31 connection to your WAN.
“Configuring the Cisco Describes how to use the Setup facility (also called the System
uBR7200 Series Router Using Configuration dialog) for configuring your CMTS, an alternative to
the Setup Facility” section on AutoInstall. Use the Setup facility prior to completing a WAN or
page 40 LAN connection to your router. The Setup facility supports several
functions so that cable interfaces and cable interface line cards are
fully operational (after initial setup).
“Removing the Cable Interfaces” Describes how to reset and remove the existing cable interfaces on
section on page 45 the Cisco uBR7200 series routers.
“Configuring the Cable Interface Provides instructions for using the Setup facility to create an initial
with the Extended Setup configuration. The extended setup prompts you to configure each
Facility” section on page 49 interface on the system.
“Configuring the Cisco Describes how to configure the Cisco uBR7200 series router
uBR7200 Series Router manually if you prefer not to use the Setup or AutoInstall facilities.
Manually Using Configuration
Mode” section on page 52

Cisco Systems, Inc.


www.cisco.com
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuration Fundamentals for the Cisco uBR7200 Series Routers

Section Purpose
“Saving Your Configuration Describes how to store the configuration or changes to your startup
Settings” section on page 53 configuration in NVRAM using the copy running-config
startup-config command.
“Reviewing Your Settings and Provides commands to check your settings and review any changes
Configurations” section on to your configuration.
page 53
“Overview of the Cisco Network Provides additional cable-specific instructions about the Cisco
Registrar for the Cisco uBR7200 Network Registrar (CNR) that are pertinent to the
Series” section on page 1 Cisco uBR7200 series and CMTS management.

Note These sections provide minimal configuration instructions. For additional configuration information,
refer to subsequent chapters in this guide. For examples of Cisco uBR7200 series CMTS configuration
files, refer to the “Viewing Sample Configuration Files” section on page 54.

Additional configuration information is available in these documents on Cisco.com:


• Cisco IOS Configuration Fundamentals Configuration Guide, Release 12.2 at
http://www.cisco.com/en/US/docs/ios/12_2/configfun/configuration/guide/ffun_c.html
• Cisco IOS Configuration Fundamentals Command Reference, Release 12.2 at
http://www.cisco.com/en/US/docs/ios/fundamentals/command/reference/cf_book.html

Tip Be sure that you have appropriate addresses and values based on your network before you attempt to
configure the router. Enter the show version command to display the release of Cisco IOS software on
your router.

Configuration Fundamentals for the Cisco uBR7200 Series


Routers
This section describes the basic parameters of using passwords, and describes initial configuration
utilities that are available to you. This section contains the following topics:
• Preconfiguring the Cisco uBR7200 Series Routers, page 24
• Booting and Logging onto the Cisco uBR7200 Series Router, page 26
• Setting Password Protection on the Cisco uBR7200 Series Router, page 27
• Recovering Passwords on the Cisco uBR7200 Series Router, page 28

Preconfiguring the Cisco uBR7200 Series Routers


Complete these prerequisite steps before you power on and configure the Cisco uBR7200 series router:

Cisco CMTS Router Basics


24
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuration Fundamentals for the Cisco uBR7200 Series Routers

SUMMARY STEPS

1. Ensure that your network supports reliable broadband data transmission.


2. Ensure that your Cisco uBR7200 series router is installed in operational fashion.
3. Ensure that all other required headend or distribution hub routing and network interface equipment
is installed, configured, and operational (based on the supported services).
4. Ensure that DHCP and DOCSIS configuration files have been created and pushed to appropriate
servers.
5. Verify sufficient and proper CPE.
6. Be familiar with your channel plan to assign appropriate frequencies.
7. Be familiar with your dial plan.
8. Obtain additional IP and security information as necessary.

DETAILED STEPS

Command or Action Purpose


Step 1 Ensure that your network supports reliable Your plant must be swept, balanced, and certified based on
broadband data transmission. National Television Standards Committee (NTSC) or
appropriate international cable plant recommendations.
Ensure that your plant meets all Data-over-Cable Service
Interface Specifications (DOCSIS) downstream and
upstream radio frequency (RF) requirements. These
requirements are documented in the DOCSIS RF
Specifications:
http://www.cablelabs.com/cablemodem/
Step 2 Ensure that your Cisco uBR7200 series router is Ensure that your Cisco uBR7200 series router is installed
installed in operational fashion. according to the instructions in the hardware installation
guide that came with your CMTS (for example, the Cisco
uBR7200 Series Hardware Installation Guide on Cisco.com.
Step 3 Ensure that all other required headend or distribution Headend installation requirements include:
hub routing and network interface equipment is
• All routers
installed, configured, and operational (based on the
supported services). • Servers (Dynamic Host Configuration Protocol (DHCP),
TFTP, and time-of-day (ToD))
• Network management systems
• Other configuration or billing systems
• IP telephony equipment including gatekeepers and
gateways
• Backbone and other equipment if supporting VPN
Dial-up access servers, telephone circuits/connections and
other equipment if supporting telco return

Cisco CMTS Router Basics


25
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuration Fundamentals for the Cisco uBR7200 Series Routers

Command or Action Purpose


Step 4 Ensure that DHCP and DOCSIS configuration files When initialized, each cable modem should be enabled to
have been created and pushed to appropriate servers. perform the following tasks:
• Transmit a DHCP request
• Receive an IP address
• Obtain TFTP and ToD server addresses
• Download a DOCSIS configuration file or updated
software image if using Cisco uBR924 cable access
routers or Cisco uBR910 cable data service units (DSUs)
in your network.
Step 5 Verify sufficient and proper CPE. Ensure that customer premises equipment (CPE)—CMs or
set-top boxes (STBs), PCs, telephones, or facsimile
machines—meet requirements for your network and service
offerings.
Step 6 Be familiar with your channel plan to assign Outline your strategies for setting up bundling or VPN
appropriate frequencies. solution sets, if applicable to your headend or distribution
hub.
Step 7 Be familiar with your dial plan. Know your dial plan if using H.323 for VoIP services and
setting up VoIP-enabled CM configuration files.
Step 8 Obtain additional IP and security information as As appropriate, obtain:
necessary. • Passwords
• IP addresses
• Subnet masks
• Device names

After these prerequisites are met, you are ready to configure the Cisco uBR7200 series CMTS. This
includes, at a minimum:
• Configuring a host name and password for the Cisco uBR7200 series router
• Configuring the router to support IP over the cable plant and network backbone

Caution If you plan to use service-class-based provisioning, the service classes must be configured at the CMTS
before CMs attempt to make a connection.

Booting and Logging onto the Cisco uBR7200 Series Router


The Cisco uBR7200 series router is administered using the Cisco command interpreter, called the
EXEC. You must boot and log in to the router before you can enter an EXEC command.

SUMMARY STEPS

1. Connect a terminal to the I/O controller console port of the Cisco uBR7200 series router and
establish a terminal session.

Cisco CMTS Router Basics


26
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuration Fundamentals for the Cisco uBR7200 Series Routers

2. Power on the Cisco uBR7200 series router. Enter no to choose the normal operating mode of the
router.
3. Continue to password definition or recovery and additional configuration.

DETAILED STEPS

Command or Action Purpose


Step 1 Connect a terminal to the I/O controller console port of the You can open a Terminal application (Hyper Terminal)
Cisco uBR7200 series router and establish a terminal on a PC as follows:
session.
a. Connect using: Direct to Com 1
b. Set bits per second: 9600
c. Set data bits: 8
d. Set parity: none
e. Set stop bit: 1
f. Set flow control: hardware
Step 2 Power on the Cisco uBR7200 series router. Enter no to The user EXEC prompt appears.
choose the normal operating mode of the router.

Example:
Would you like to enter the initial dialog?[yes]:
no
Router>
Step 3 Continue to password definition or recovery and additional Refer to the remaining procedures in this chapter.
configuration.

Setting Password Protection on the Cisco uBR7200 Series Router

Note For security purposes, the EXEC has two levels of access to commands: user EXEC mode and privileged
EXEC mode. The commands available at the user level are a subset of those available at the privileged
level.

Tip Because many privileged-level EXEC commands are used to set operating parameters, password-protect
these commands to prevent unauthorized use.

SUMMARY STEPS

1. enable secret password or enable password


2. password

Cisco CMTS Router Basics


27
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuration Fundamentals for the Cisco uBR7200 Series Routers

DETAILED STEPS

Command or Action Purpose


Step 1 At the EXEC prompt, enter one of the following These command differ in their security level.
two commands to set password protection:
enable secret password • enable secret password — Enters a very secure,
or encrypted password.
enable password • enable password — Enters a less secure, nonencrypted
password.

Example:
Router> enable secret cisco

Step 2 To gain access to privilege EXEC-level commands,


enter the desired password.

Note • An enable secret password can contain from 1 to 25 alphanumeric characters in uppercase and
lowercase.
• An enable password can contain any number of alphanumeric characters in uppercase and
lowercase.
• A number cannot be the first character.
• Spaces are valid password characters; for example, “two words” is a valid password.
• Leading spaces are ignored. Trailing spaces are recognized.
• Alphanumeric characters are recognized as uppercase or lowercase.

Passwords should be different for maximum security. If you enter the same password for both during the
setup script, the system accepts it, but you receive a warning message indicating that you should enter a
different password.

Recovering Passwords on the Cisco uBR7200 Series Router


This section describes how to recover a lost enable or console login password and how to replace a lost
enable secret password on your Cisco uBR7200 series router.

Note It is possible to recover the enable or console login password. The enable secret password is encrypted,
however, and must be replaced with a new enable secret password.

Overview of the Password Recovery Process


Following is an overview of the general steps in the password recovery procedure:

Step 1 If you can log in to the router, enter the show version command to determine the existing configuration
register value.

Cisco CMTS Router Basics


28
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuration Fundamentals for the Cisco uBR7200 Series Routers

Step 2 Press the Break key to get to the bootstrap program prompt (ROM monitor). You might need to reload
the system image by power cycling the router.
Step 3 Change the configuration register so that the following functions are enabled:
• Break
• Ignore startup configuration
• Boot from Flash memory

Note The key to recovering a lost password is to set the configuration register bit 6 (0x0040) so that
the startup configuration (usually in NVRAM) is ignored. This allows you to log in without
using a password and to display the startup configuration passwords. Cisco recommends setting
the configuration register to 0x142.

Step 4 Power cycle the router by turning power off and then back on.
Step 5 Log in to the router and enter the privileged EXEC mode.
Step 6 Enter the show startup-config command to display the passwords.
Step 7 Recover or replace the displayed passwords.
Step 8 Change the configuration register back to its original setting.

Note To recover a lost password if Break is disabled on the router, you must have physical access to the router.

Replacing or Recovering Passwords


Complete the following steps to recover or replace a lost enable, enable secret, or console login
password:

Step 1 Attach an ASCII terminal to the console port on your Cisco uBR7200 series router.
Step 2 Configure the terminal to operate at 9600 baud, 8 data bits, no parity, and 2 stop bits.
Step 3 If you can log in to the router as a nonprivileged user, enter the show version command to display the
existing configuration register value. Note the value for later use. If you cannot log in to the router at all,
continue with the next step.
Step 4 Press the Break key or send a Break from the console terminal.
• If Break is enabled, the router enters the ROM monitor, indicated by the ROM monitor prompt
(rommon n>), where n is the number of the command line. Proceed to Step 6.
• If Break is disabled, power cycle the router (turn the router off or unplug the power cord, and then
restore power). Proceed to Step 5.
Step 5 Within 60 seconds of restoring the power to the router, press the Break key or send a Break. This action
causes the router to enter the ROM monitor and display the ROM monitor prompt (rommon 1>).
Step 6 To set the configuration register on a Cisco uBR7200 series router, use the configuration register utility
by entering the confreg command at the ROM monitor prompt as follows:
rommon 1> confreg

Cisco CMTS Router Basics


29
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuration Fundamentals for the Cisco uBR7200 Series Routers

Answer yes to the enable ignore system config info? prompt and note the current configuration
register settings.
Step 7 Initialize the router by entering the reset command as follows:
rommon 2> reset

The router initializes, the configuration register is set to 0x142, the router boots the system image from
Flash memory and enters the System Configuration dialog (setup), as follows:
--- System Configuration Dialog --

Step 8 Enter no in response to the System Configuration dialog prompts until the following message appears:
Press RETURN to get started!

Step 9 Press Return. The user EXEC prompt appears as follows:


Router>

Step 10 Enter the enable command to enter privileged EXEC mode.


Step 11 Enter the show startup-config command to display the passwords in the configuration file as follows:
Router# show startup-config

Step 12 Scan the configuration file display looking for the passwords; the enable passwords are usually near the
beginning of the file, and the console login or user EXEC password is near the end. The passwords
displayed will appear similar to the following:
enable secret 5 $1$ORPP$s9syZt4uKn3SnpuLDrhuei
enable password 23skiddoo
.
.
line con 0
password onramp

Note The enable secret password is encrypted and cannot be recovered; it must be replaced. The enable and
console passwords can be encrypted text or clear text.

Proceed to the next step to replace an enable secret, console login, or enable password. If there is no
enable secret password, note the enable and console login passwords if they are not encrypted and
proceed to Step 17.

Caution Do not perform the next step unless you have determined that you must change or replace the enable,
enable secret, or console login passwords. Failure to follow the steps as presented here could cause your
router configuration to be erased.

Step 13 Enter the configure memory command to load the startup configuration file into running memory. This
action allows you to modify or replace passwords in the configuration.
Router# configure memory

Step 14 Enter the configure terminal command for configuration mode:


Router# configure terminal

Step 15 To change all three passwords, enter the following commands:

Cisco CMTS Router Basics


30
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cisco uBR7200 Series Router Using AutoInstall

Router(config)# enable secret newpassword1


Router(config)# enable password newpassword2
Router(config)# line con 0
Router(config)# password newpassword3

Change only the passwords necessary for your configuration. You can remove individual passwords by
using the no form of the previous commands. For example, entering the no enable secret command
removes the enable secret password.
Step 16 You must configure all interfaces to not be administratively shut down as follows:
Router(config)# interface fast ethernet 0/0
Router(config)# no shutdown

Enter the equivalent commands for all interfaces that were originally configured. If you omit this step,
all interfaces are administratively shut down and unavailable when the router is restarted.
Step 17 Use the config-register command to set the configuration register to the original value noted in Step 3
or Step 7.
Step 18 Press Ctrl-Z or type end to exit configuration mode:
Router(config)# end

Caution Do not perform the next step unless you have changed or replaced a password. If you have skipped
Step 13 through Step 16 previously, then proceed now to Step 20. Failure to observe this sequence
causes the system to erase your router configuration file.

Step 19 Enter the copy running-config startup-config command to save the new configuration to nonvolatile
memory:
Router# copy running-config startup-config

Step 20 Enter the reload command to reboot the router:


Router# reload

Step 21 Log in to the router with the new or recovered passwords.

Configuring the Cisco uBR7200 Series Router Using AutoInstall


This section provides information about AutoInstall, a Cisco IOS software feature that allows you to
configure a new router automatically and dynamically. The AutoInstall process involves connecting a
new router to a network where an existing router is preconfigured, turning on the new router, and
enabling it with a configuration file that is automatically downloaded from a TFTP server.
The AutoInstall process begins any time a Cisco IOS software-based device is turned on and a valid
configuration file is not found in nonvolatile random-access memory (NVRAM).

Note If you wish to configure the device manually, you should connect directly to the console port and ensure
that the router is not connected to the network via any of the interface ports before you turn on the router.
Note that it may take several minutes for the device to determine that AutoInstall is not connected to the
network.

Cisco CMTS Router Basics


31
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cisco uBR7200 Series Router Using AutoInstall

This section contains the following information and procedures:


• “Autoinstall Requirements” section on page 32
• “Understanding AutoInstall” section on page 33
• “Preparing for the AutoInstall Process” section on page 33
• “Performing the AutoInstall Procedure” section on page 34
• “Setting Up the TFTP Server for Autoinstall” section on page 37
• “Setting Up the BOOTP or RARP Server for Autoinstall” section on page 38
• “Connecting the New Router to the Network” section on page 39

Autoinstall Requirements
For AutoInstall to work properly, the following conditions must be met:
• Routers must be attached physically to the network using one or more of the following interface
types:
– Ethernet
– Token Ring
– FDDI
– Serial with High-Level Data Link Control (HDLC) encapsulation
– Serial with Frame Relay encapsulation

Note HDLC is the default serial encapsulation. If the AutoInstall process fails over HDLC, the Cisco IOS
software automatically configures Frame Relay encapsulation.

Note Of Token Ring interfaces, only those that set ring speed with physical jumpers support AutoInstall.
AutoInstall does not work with Token Ring interfaces for which the ring speed must be set with software
configuration commands. If the ring speed is not set, the interface is set to shutdown mode.

• A TCP/IP host on your network must be preconfigured to provide the required configuration files.
• The TCP/IP host can exist anywhere on the network as long as the following conditions are
maintained:
– The host must be on the LAN or WAN side of the router’s line card connection to the WAN.
– The User Datagram Protocol (UDP) broadcasts to and from the router.
– The TCP/IP host is enabled.
This functionality is coordinated by your system administrator at the site where the TCP/IP host is
located. You should not use AutoInstall unless the required files are available on the TCP/IP host.

Cisco CMTS Router Basics


32
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cisco uBR7200 Series Router Using AutoInstall

Understanding AutoInstall
Once the requirements for using AutoInstall are met, the dynamic configuration of the new router occurs
as follows:
1. The new router acquires its IP address. Depending on the interface connection between the two
routers and/or access servers, the new router's IP address is dynamically resolved by either SLARP
requests or BOOTP or RARP requests.
2. The new router resolves its name through network-confg, cisconet.cfg, or DNS.
3. The new router automatically requests and downloads its configuration file from a TFTP server.
4. If a host name is not resolved, the new router attempts to load router-confg or ciscortr.cfg.

Preparing for the AutoInstall Process


Complete the following steps to prepare your Cisco uBR7200 series CMTS router for the AutoInstall
process:

Step 1 Attach the appropriate synchronous serial cable to the synchronous serial interface 0 on the router.
Step 2 Turn the power switch on each power supply to the ON (|) position. This action turns on power to the
router.
The router loads the operating system image from Flash memory; this process can take several minutes.
If the remote end of the WAN connection is connected and properly configured, the AutoInstall process
begins.
Step 3 When the AutoInstall process is completed, use the copy running-config startup-config command to
write the configuration data to the router’s nonvolatile random-access memory (NVRAM):
Router# copy running-config startup-config

Completing this step saves the configuration settings that the AutoInstall process created to NVRAM. If
you fail to do this, your configuration will be lost the next time you reload the router.
Step 4 Choose your preferred method to verify the required file configurations for the AutoInstall Facility:

Task Description
a. Verify that the configuration file is Complete this task first (required). Verify that a configuration file
on the TFTP server. for the new router resides on a TFTP server. This file can contain
the full or minimum-required configuration for the administrator
to Telnet into the new router (for configuration using Autoinstall).
Note In addition, complete one of the following two tasks.
b. Verify that a file named Complete this task, or task c. In this task, verify that the
network-confg also resides on the network-confg file on the TFTP server has an Internet Protocol
TFTP server. (IP) host name entry for the new router. The TFTP server must be
reachable from the new router.
c. Add IP-address-to-host name Complete this task, or task b. In this task, add an IP address-to-host
mapping to a DNS database file. name mapping for the new router to a Domain Name System
(DNS) database file on the TFTP server.

Cisco CMTS Router Basics


33
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cisco uBR7200 Series Router Using AutoInstall

Step 5 If the existing router is to help install the new router automatically via an HDLC-encapsulated serial
interface using Serial Line Address Resolution Protocol (SLARP), that interface must be configured
with an IP address whose host portion has the value 1 or 2. (AutoInstall over Frame Relay does not have
this address constraint.) Subnet masks of any size are supported.
Step 6 If the existing router is to help install the new router automatically using a Frame Relay-encapsulated
serial interface, that interface must be configured with the following:
• An IP helper address pointing to the TFTP server. In the following example, 171.69.2.75 is the
address of the TFTP server:
ip helper 171.69.2.75
• A Frame Relay map pointing back to the new router. In the following example, 172.21.177.100 is
the IP address of the new router's serial interface, and 100 is the PVC identifier:
frame-relay map ip 172.21.177.100 100 dlci
Step 7 If the existing router is to help install the new router automatically via an Ethernet, Token Ring, or FDDI
interface using BOOTP or Reverse Address Resolution Protocol (RARP), then a BOOTP or RARP server
also must be set up to map the new router's Media Access Control (MAC) address to its IP address.
Step 8 IP helper addresses might need to be configured to forward the TFTP and DNS broadcast requests from
the new router to the host that is providing those services.

Performing the AutoInstall Procedure


This procedure provides the steps to configure your Cisco uBR7200 series router using AutoInstall.

Note For a detailed description of the processes involved with AutoInstall, refer to the “Using AutoInstall and
Setup” chapter in the Cisco IOS Configuration Fundamentals Configuration Guide, Release 12.2 book
on Cisco.com.

To dynamically configure a new router using AutoInstall, complete the following steps. Steps 1, 2, and 3
are completed by the central administrator. Step 4 is completed by the person at the remote site.

Step 1 Modify the existing router's configuration to support the AutoInstall procedure.
Step 2 Set up the TFTP server to support the AutoInstall procedure.
Step 3 Set up the BOOTP or RARP server if needed. A BOOTP or RARP server is required for AutoInstall
using an Ethernet, Token Ring, FDDI, or Frame Relay-encapsulated serial interface. With a Frame
Relay-encapsulated serial interface, the existing router acts as the BOOTP server. A BOOTP or RARP
server is not required for AutoInstall using an HDLC-encapsulated serial interface.
Step 4 Connect the new router to the network.

Configuring an Interface to Allow Use of AutoInstall


You can use AutoInstall through any of the following types of interfaces:
• Using an HDLC-Encapsulated Serial Interface Connection (the default configuration for a serial
line)

Cisco CMTS Router Basics


34
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cisco uBR7200 Series Router Using AutoInstall

• Using an Ethernet, Token Ring, or FDDI Interface Connection


• Using a Frame Relay-Encapsulated Serial Interface Connection

Using an HDLC-Encapsulated Serial Interface Connection

To set up AutoInstall via a serial line with HDLC encapsulation (the default), you must configure the
existing router. Use the following commands, beginning in global configuration mode:

Command Purpose
Step 1 interface serial Configures the serial interface that connects to the new router with
interface-number HDLC encapsulation (the default), and enters interface configuration
mode for the specified interface number.
Step 2 ip address address mask Enters an IP address for the interface. The host portion of the address
must have a value of 1 or 2. (AutoInstall over Frame Relay does not have
this address constraint.)
Step 3 ip helper-address address Configures a helper address for the serial interface to forward broadcasts
associated with the TFTP, BOOTP, and DNS requests.
Step 4 clock rate bps (Optional) Configures a DCE clock rate for the serial line, unless an
external clock is being used. This step is needed only for DCE appliques.
Step 5 Ctrl-Z Exits configuration mode.
Step 6 copy running-config Saves the configuration file to your startup configuration. On most
startup-config platforms, this step saves the configuration to NVRAM. On the
Cisco7000 family, this step saves the configuration to the location
specified by the CONFIG_FILE environment variable.

In the following example, the existing router's configuration file contains the commands needed to
configure the router for AutoInstall on a serial line using HDLC encapsulation:
Router# more system:startup-config
. . .
interface serial 0
ip address 172.31.10.1 255.255.255.0
ip helper-address 172.31.20.5
. . .

Using an Ethernet, Token Ring, or FDDI Interface Connection

To set up AutoInstall using an Ethernet, Token Ring, or FDDI interface, you must modify the
configuration of the existing router. Use the following commands, beginning in global configuration
mode:

Command Purpose
Step 1 interface {ethernet | tokenring | Enters interface configuration mode for the specified LAN
fddi} interface-number interface.
Step 2 ip address address mask Specifies an IP address for the interface.
Step 3 ip helper-address address (Optional) Configures a helper address to forward broadcasts
associated with the TFTP, BOOTP, and DNS requests.

Cisco CMTS Router Basics


35
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cisco uBR7200 Series Router Using AutoInstall

Command Purpose
Step 4 Ctrl-Z Exits configuration mode.
Step 5 copy running-config startup-config Saves the configuration file to your startup configuration. On
most platforms, this step saves the configuration to NVRAM.
On the Cisco7000 family, this step saves the configuration to
the location specified by the CONFIG_FILE environment
variable.

Typically, the LAN interface and IP address are already configured on the existing router. You might
need to configure an IP helper address if the TFTP server is not on the same network as the new router.
In the following example, the existing router's configuration file contains the commands needed to
configure the router for AutoInstall on an Ethernet interface:
Router# more system:startup-config
. . .
interface Ethernet 0
ip address 172.31.10.1 255.255.255.0
ip helper-address 172.31.20.5
. . .

Using a Frame Relay-Encapsulated Serial Interface Connection

To set up AutoInstall via a serial line with Frame Relay encapsulation, you must configure the existing
router. Use the following commands beginning in global configuration mode:

Command Purpose
Step 1 interface serial 0 Configures the serial interface that connects to the new router,
and enters interface configuration mode.
Step 2 encapsulation frame-relay Configures Frame Relay encapsulation on the interface that
connects to the new router.
Step 3 frame-relay map ip ip-address dlci Creates a Frame Relay map pointing back to the new router.
or or
frame-relay interface-dlci dlci For point-to-point subinterfaces, assigns a data link connection
option [protocol ip ip-address] identifier (DLCI) to the interface that connects to the new
router, and provides the IP address of the serial port on the new
router.
Step 4 ip address address mask Specifies an IP address for the interface. This step sets the IP
address of the existing router.
Step 5 ip helper-address address Configures a helper address for the TFTP server.
Step 6 _(_IREFOBJ:1006127_) (Optional) Configures a DCE clock rate for the serial line,
_clock rate bps unless an external clock is being used. This step is needed only
for DCE appliques.
Step 7 Ctrl-Z Exits configuration mode.
Step 8 copy running-config startup-config Saves the configuration file to your startup configuration.
Note On most platforms, this step saves the configuration to
NVRAM. On the Cisco 7000 family, this step saves the
configuration to the location specified by the
CONFIG_FILE environment variable.

Cisco CMTS Router Basics


36
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cisco uBR7200 Series Router Using AutoInstall

You must use a DTE interface on the new router because the network always provides the clock signal.
In the following example, the existing router's configuration file contains the commands needed to
configure the router for Frame Relay AutoInstall on a serial line:
Router# more system:startup-config
. . .
interface serial 0
ip address 172.31.20.20 255.255.255.0
encapsulation frame-relay
frame-relay map ip 172.31.10.1 255.255.255.0 48
ip helper-address 172.31.20.5
. . .

Setting Up the TFTP Server for Autoinstall


For AutoInstall to work correctly, the new router must be able to resolve its host name and then download
a name-confg or a name.cfg file from a TFTP server. The new router can resolve its host name by using
a network-confg or a cisconet.cfg file downloaded from a TFTP server or by using the DNS.
To set up a TFTP server to support AutoInstall, perform the following steps:

Step 1 Enable TFTP on a server. For information on this process, consult your host vendor's TFTP server
documentation and RFCs 906 and 783.
Step 2 If you want to use a network-confg or cisconet.cfg file to resolve the new router's name, create the
network-confg or cisconet.cfg file containing an IP address-to-host name mapping for the new router.
Enter the ip host command into the TFTP config file, not into the router. The IP address must match the
IP address that is to be dynamically obtained by the new router.
If you want to use DNS to resolve the new router's name, create an address-to-name mapping entry for
the new router in the DNS database. The IP address must match the IP address that is to be dynamically
obtained by the new router. For more information on this step, contact your DNS administrator or refer
to RFCs 1101 and 1183.
Step 3 Create the name-confg or name.cfg file, which should reside in the tftpboot directory on the TFTP server.
The name part of name-confg or name.cfg filename must match the host name you assigned for the new
router in the previous step. Enter configuration commands for the new router into this file.
The name-confg or the name.cfg file can contain either the new router's full configuration or a minimal
configuration.
The minimal configuration file is a virtual terminal password and an enable password. It allows an
administrator to Telnet into the new router to configure it. If you are using BOOTP or RARP to resolve
the address of the new router, the minimal configuration file must also include the IP address to be
obtained dynamically using BOOTP or RARP.
You can use the copy running-config tftp command to help you generate the configuration file that you
later download during the AutoInstall process.

Note The existing router might need to forward TFTP requests and response packets if the TFTP server is not
on the same network segment as the new router. When you modified the existing router's configuration,
you specified an IP helper address for this purpose.

Cisco CMTS Router Basics


37
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cisco uBR7200 Series Router Using AutoInstall

You can save a minimal configuration under a generic newrouter-confg file. Use the ip host command
in the network-confg or cisconet.cfg file to specify newrouter as the host name with the address you will
be dynamically resolving. The new router should then resolve its IP address, host name, and minimal
configuration automatically.
Use Telnet to connect to the new router from the existing router and use the setup command facility to
configure the rest of the interfaces. For example, the line in the network-confg or cisconet.cfg file could
be similar to the following:
ip host newrouter 131.108.170.1

The following host configuration file contains the minimal set of commands needed for AutoInstall using
SLARP or BOOTP:
enable-password letmein
!
line vty 0
password letmein
!
end

The preceding example shows a minimal configuration for connecting from a router one hop away. From
this configuration, use the setup facility to configure the rest of the interfaces. If the router is more than
one hop away, you also must include routing information in the minimal configuration.
The following minimal network configuration file maps the new router's IP address, 131.108.10.2, to the
host name newrouter. The new router's address was learned via SLARP and is based on the existing
router's IP address of 131.108.10.1.
ip host newrouter 131.108.10.2

Setting Up the BOOTP or RARP Server for Autoinstall


If the new router is connected to the existing router using an Ethernet, Token Ring, or FDDI interface,
you must configure a BOOTP or RARP server to map the new router's MAC address to its IP address. If
the new router is connected to the existing router using a serial line with HDLC encapsulation, or if you
are configuring AutoInstall over Frame Relay, the tasks in this section are not required.
To configure a BOOTP or RARP server, use one of the following commands:
Command Purpose
Refer to your host vendor's documentation If BOOTP is to be used to resolve the new router's IP
and to RFCs 951 and 1395 address, configure your BOOTP server.
Refer to your host vendor's documentation If RARP is to be used to resolve the new router's IP
and to RFC 903 address, configure your RARP server.

Note If the RARP server is not on the same subnet as the new router, use the ip rarp-server command to
configure the existing router to act as a RARP server. For more information, see the "Configuring a
Router as a RARP Server" section.

The following host configuration file contains the minimum set of commands needed for AutoInstall
using RARP. It includes the IP address that will be obtained dynamically via BOOTP or RARP during
the AutoInstall process. When RARP is used, this extra information is needed to specify the proper
netmask for the interface.
interface ethernet 0

Cisco CMTS Router Basics


38
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cisco uBR7200 Series Router Using AutoInstall

ip address 131.108.10.2 255.255.255.0


enable-password letmein
!
line vty 0
password letmein
!
end

Connecting the New Router to the Network


Connect the new router to the network using either an HDLC-encapsulated or Frame Relay-encapsulated
serial interface or an Ethernet, Token Ring, or FDDI interface. After the router successfully resolves its
host name, newrouter sends a TFTP broadcast requesting the file name-confg or name.cfg. The router
name must be in all lowercase, even if the true host name is not. The file is downloaded to the new router,
where the configuration commands take effect immediately. If the configuration file is complete, the new
router should be fully operational.
To save the complete configuration to NVRAM, use the following commands in privileged EXEC mode:

Command Purpose
Step 1 enable password Enters privileged mode on the new router.
Step 2 copy running-config Saves the information from the name-config file into your startup
startup-config configuration. On most platforms, this step saves the configuration to
NVRAM. On the Cisco 7000 family, this step saves the configuration to the
location specified by the CONFIG_FILE environment variable.

Caution Verify that the existing and new routers (or access servers) are connected before entering the
copy running-config startup-config EXEC command to save configuration changes. Use the ping
EXEC command to verify connectivity. If an incorrect configuration file is downloaded, the new router
will load NVRAM configuration information before it can enter AutoInstall mode.

If the configuration file is a minimal configuration file, the new router comes up, but with only one
interface operational. Use the following commands to connect to the new router and configure it:

Command Purpose
Step 1 telnet existing Establishes a Telnet connection to the existing router.
Step 2 telnet newrouter From the existing router, establishes a Telnet connection to the new router.
Step 3 enable password Enters privileged EXEC mode.
Step 4 setup Enters setup mode to configure the new router.

Cisco CMTS Router Basics


39
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cisco uBR7200 Series Router Using the Setup Facility

Configuring the Cisco uBR7200 Series Router Using the Setup


Facility

Introduction to the Setup Facility


The Cisco uBR7200 series Setup facility (also called the System Configuration dialog) is a useful and
efficient tool for configuring your CMTS. The Cable Interface Setup Facility is an alternative mechanism
to enable or configure Cisco uBR7200 series parameters. The Setup facility supports automated
configuration of upstream parameters.
In earlier releases, upstream ports were put in a default shut-down state after the Setup facility was run.
You had to use the CLI to configure a fixed frequency or create a spectrum group, assign an interface to
it, and enable each upstream port on a cable interface line card. The Setup facility now supports
configuring and enabling upstream parameters.
The Setup facility supports the following functions so that cable interfaces and cable interface line cards
are fully operational after initial setup:
• Cable-specific commands
• Upstream frequency definition
For each cable interface, the following information is mandatory:
Per upstream:
cable upstream n frequency f
no cable upstream n shutdown

Options include definition of the following information:


• DHCP server address.
• Options are also provided to set downstream frequency for the upconverter per interface.
If you do not plan to use AutoInstall, do not connect the router’s WAN or LAN cable to the channel
service unit (CSU) and data service unit (DSU). If the WAN or LAN cable is connected to the CSU and
DSU and the router does not have a configuration stored in NVRAM, the router attempts to run
AutoInstall at startup.

Tip The router might take several minutes to determine that AutoInstall is not set up to a remote TCP/IP host.

When the router determines that AutoInstall is not configured, it defaults to the Setup facility. If the LAN
or WAN cable is not connected, the router boots from Flash memory and automatically runs the Setup
facility.

Note You can run the Setup facility when the enable prompt (#) is displayed, by entering the setup command
in privileged EXEC mode.

Configuring Global Parameters with the Setup Facility


When you first start the program, configure the global parameters to control system-wide settings:

Cisco CMTS Router Basics


40
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cisco uBR7200 Series Router Using the Setup Facility

Step 1 Connect a console terminal to the console port on the I/O controller, and then boot the router.
Step 2 After booting from Flash memory, the following information appears after about 30 seconds. When you
see this information, you have successfully booted your router:
Restricted Rights Legend

Use, duplication, or disclosure by the Government is


subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

cisco Systems, Inc.


170 West Tasman Drive
San Jose, California 95134-1706

Cisco Internetwork Operating System Software


IOS (tm) 7200 Software (UBR7200-IK1S-M), Version 12.1(10)EC
TAC Support: http://www.cisco.com/tac
Copyright (c) 1986-2001 by cisco Systems, Inc.
Compiled Fri 24-Nov-01 12:59 by yiyan
Image text-base: 0x60008950, data-base: 0x61478000

Compliance with U.S. Export Laws and Regulations - Encryption

This product performs encryption and is regulated for export


by the U.S. Government.

This product is not authorized for use by persons located


outside the United States and Canada that do not have prior
approval from Cisco Systems, Inc. or the U.S. Government.

This product may not be exported outside the U.S. and Canada
either by physical or electronic means without PRIOR approval
of Cisco Systems, Inc. or the U.S. Government.

Persons outside the U.S. and Canada may not re-export, resell,
or transfer this product by either physical or electronic means
without prior approval of Cisco Systems, Inc. or the U.S.
Government.

Cisco uBR7246VXR (NPE300) processor (revision D) with 253952K/40960K bytes


of memory.
Processor board ID SAB0433019F
R7000 CPU at 262Mhz, Implementation 39, Rev 2.1, 256KB L2, 2048KB L3 Cache
6 slot VXR midplane, Version 2.0

Last reset from power-on


Bridging software.
X.25 software, Version 3.0.0.
2 FastEthernet/IEEE 802.3 interface(s)
4 Serial network interface(s)
4 Cable Modem network interface(s)
125K bytes of non-volatile configuration memory.

125440K bytes of ATA PCMCIA card at slot 0 (Sector size 512 bytes).
4096K bytes of Flash internal SIMM (Sector size 256K).
cable submgmt default active

Press RETURN to get started!

Cisco CMTS Router Basics


41
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cisco uBR7200 Series Router Using the Setup Facility

Note The first two sections of the configuration script, the banner and the installed hardware, appear only at
initial system startup. On subsequent uses of the Setup facility, the script begins with the following
prompt.

--- System Configuration Dialog ---


Continue with configuration dialog? [yes/no]: yes

At any point you may enter a question mark '?' for help.
Use ctrl-c to abort configuration dialog at any prompt.
Default settings are in square brackets '[]'.

Basic management setup configures only enough connectivity


for management of the system, extended setup will ask you
to configure each interface on the system

Step 3 When asked if you want to continue with the System Configuration dialog and enter basic management
setup (displays the current interface summary), enter yes or press Return:
Continue with configuration dialog? [yes/no]: yes
.
.
.
Would you like to enter basic management setup? [yes/no]: yes

The interface summary appears, showing the state of configured and unconfigured interfaces.
Step 4 Choose which protocols to support on your interfaces. For IP-only installations, you can accept the
default values for most of the questions. A typical configuration using IP follows and continues through
Step 7:
Configuring global parameters:

Enter host name [Router]: router

Step 5 Enter the enable secret password, the enable password, and the virtual terminal password:
The enable secret password is a one-way cryptographic secret
password used instead of the enable password when it exists.

Enter enable secret: ******

The enable password is used when there is no enable secret


password and when using older software and some boot images.

Enter enable password: ******

Enter virtual terminal password: ******

Step 6 The Simple Network Management Protocol (SNMP) is the most widely supported open standard for
network management. SNMP provides a means to access and set configuration and run-time parameters
of routers and communication servers. SNMP also defines a set of functions that can be used to monitor
and control network elements.
Enter yes to accept SNMP management; enter no to refuse it:
Configure SNMP Network Management? [no]:
Community string [public]:

Step 7 In all cases, you will use IP routing. When you are using IP routing, select an interior routing protocol.
You can specify one of only two interior routing protocols to operate on your system using the Setup
facility, either Interior Gateway Routing Protocol (IGRP) or Routing Information Protocol (RIP).

Cisco CMTS Router Basics


42
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cisco uBR7200 Series Router Using the Setup Facility

To configure IP routing, enter yes (the default) or press Return, and then select an interior routing
protocol:
Configure IP? [yes]:
Configure IGRP routing? [yes]:
Your IGRP autonomous system number [1]: 15

Step 8 Configure your line card interface parameters. The following example shows how an 8-port Ethernet line
card is installed in line card slot 3. The Setup facility determines the status of all interfaces.
To configure each active interface port for IP, enter yes (the default) or press Return. For all inactive
ports, the default is no. You can press Return to accept the default.
Configuring interface Ethernet 1/0:
Is this interface in use? [yes]:
Configure IP on this interface? [yes]:
IP address for this interface [19.2.22.4]:
Number of bits in subnet field [8]:
Class A network is 19.0.0.0, 8 subnet bits; mask is /16

Configuring interface Ethernet1/1:


Is this interface in use? [no]:

Configuring interface Ethernet1/2:


Is this interface in use? [no]:

Configuring interface Ethernet1/3:


Is this interface in use? [no]:

Configuring interface Ethernet1/4:


Is this interface in use? [no]:

Configuring interface Ethernet1/5:


Is this interface in use? [no]:

Configuring interface Ethernet1/6:


Is this interface in use? [no]:

Configuring interface Ethernet1/7:


Is this interface in use? [no]:

Step 9 Configure your cable interface. The following example shows a Cisco uBR7200 series router with cable
interface. The Setup facility, for the most part, determines the status of all interfaces.
To configure each active interface port, enter yes (the default) or press Return. For all inactive ports, the
default is no. You can press Return to accept the default.

Configuring interface cable 5/0:


Is this interface in use? [yes]:
Configure this interface? [yes]:
IP address for this interface [19.2.22.5]:
Number of bits in subnet field [8]:
Class A network is 19.0.0.0, 8 subnet bits; mask is /16

Configuring interface cable 1/1:


Is this interface in use? [yes]:
Configure this interface? [yes]:
IP address for this interface [19.2.22.6]:
Number of bits in subnet field [8]:
Class A network is 19.0.0.0, 8 subnet bits; mask is /16

The configuration program displays the newly created command interface script:

Cisco CMTS Router Basics


43
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cisco uBR7200 Series Router Using the Setup Facility

The following command script was created:

hostname router
enable secret 5 $1$f0fc$A38P/KN/9yD3sEKSt6hKQ/
enable password betty
line vty 0 4
password wilma
snmp-server community public
!
ip routing
!
interface cable 5/0
ip address 19.2.22.5 255.255.0.0

router igrp 15
network 19.0.0.0
!
end

Step 10 When asked if you want to use this configuration, enter yes or press Return.
Use this configuration? [yes/no]: yes

Step 11 Save the configuration to NVRAM:


Router# copy running-config startup-config

Note You must always manually save the configuration settings to NVRAM whenever they are modified.

Configuring Upstream Frequencies with the Setup Facility


Upstream parameters must be configured manually. After the Setup facility is run, upstream ports have
a default state of “shutdown.” You have two methods to configure upstream channel frequencies:
• Configure a fixed frequency between 5 to 42 MHz for North American channel plans, and enable
the upstream port.
• Create a global spectrum group, assign the interface to it, and enable the upstream port.
The cable interface card receiver accepts time-division multiplexed burst transmissions from
cable interfaces (or CMs in set-top boxes), which are DOCSIS-based. The upstream port becomes “up”
when it is assigned an upstream frequency and is configured to be administratively up.
The upstream port is frequency-agile. The frequency can change while the interface is up and carrying
traffic, if you define spectrum groups per the example provided.

Configuring Individual Upstream Modulation Profiles


You can define individual modulation profiles. A modulation profile consists of a table of physical layer
characteristics for the different types of upstream bursts such as initial maintenance, long grant, request
data, request, short grant, and station maintenance.

Note Only qualified personnel should define upstream modulation profiles.

Cisco CMTS Router Basics


44
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Removing the Cable Interfaces

Complete these steps to activate upstream interfaces:

Step 1 After the Setup facility has initially configured noncable interfaces on the Cisco uBR7200 series router,
enter the enable command and your password (privileged EXEC).
Step 2 Enter the configure terminal command to get into global configuration mode.
Step 3 In global configuration mode, configure modulation profiles and spectrum groups for your
Cisco uBR7200 series router using the cable modulation-profile and cable spectrum-group
commands.
Step 4 In cable interface configuration mode, configure various characteristics for the interface in question,
using the cable upstream commands.

Removing the Cable Interfaces


This section shows you how to reset the current interface configuration and remove the interface.

Removing the Wideband Cable Interface


To remove or delete a wideband cable interface, do the following:

Step 1 Reset the configuration of the interface back to its default values using the default command in global
configuration mode.
Router(config)# default interface wideband-Cable slot/port:wideband-channel

Step 2 Enter the wideband cable interface configuration mode.


Router(config)# interface wideband-Cable slot/port:wideband-channel

Step 3 Shutdown the wideband cable interface.


Router(config-if) shutdown

Step 4 Exit the wideband cable interface configuration mode.


Router(config-if) exit

Step 5 Exit the global configuration mode.


Router(config) exit

Removing the Integrated Cable Interface


To remove or delete an integrated cable interface, do the following:

Step 1 Reset the configuration of the interface back to its default values using the default command in global
configuration mode.
Router(config)# default interface Integrated-Cable slot/port:rf-channel

Cisco CMTS Router Basics


45
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Removing the Cable Interfaces

Step 2 Enter the integrated cable interface configuration mode.


Router(config)# interface Integrated-Cable slot/port:rf-channel

Step 3 Shutdown the integrated cable interface.


Router(config-if) shutdown

Step 4 Exit the integrated cable interface configuration mode.


Router(config-if) exit

Step 5 Exit the global configuration mode.


Router(config) exit

Configuring Interfaces with the Setup Facility


Follow the procedure in this section to configure WAN or LAN interfaces. To configure interface
parameters, have your interface network addresses and subnet mask information ready.

Configuring Ethernet Interfaces

Step 1 In the following example, the system is being configured for an Ethernet LAN using IP. Respond to the
prompts as follows, using your own addresses and mask at the setup prompts:
Configuring interface parameters:
Configuring interface Ethernet0/0:
Is this interface in use? [no]: yes
Configure IP on this interface? [no]: yes
IP address for this interface: 1.1.1.10
Number of bits in subnet field [0]:
Class A network is 1.0.0.0, 0 subnet bits; mask is 255.0.0.0

Step 2 Do not enable Internetwork Package Exchange (IPX) on this interface; IPX is not supported on the Cisco
uBR7200 series universal broadband router:
Configure IPX on this interface? [no]: no

Step 3 If additional Ethernet interfaces are available in your system, enter their configurations when you are
prompted.
Step 4 Save the configuration to NVRAM:
Router# copy running-config startup-config

Note You must always manually save the configuration settings to NVRAM whenever they are modified.

Configuring Synchronous Serial Interfaces


The synchronous serial interfaces are configured to allow connection to WANs through a CSU/DSU.
Complete the following steps to configure the serial ports:

Cisco CMTS Router Basics


46
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Removing the Cable Interfaces

Step 1 To configure serial port 0 enter yes:


Configuring interface Serial0/0:
Is this interface in use? [no]: yes

Step 2 Determine which protocols you want on the synchronous serial interface and enter the appropriate
responses:
Configure IP unnumbered on this interface? [no]:
IP address for this interface: 10.1.1.20
Number of bits in subnet field [0]:
Class A network is 10.0.0.0, 0 subnet bits; mask is 255.0.0.0

Step 3 If additional synchronous serial interfaces are available in your system, enter their configurations when
you are prompted.
Step 4 Save the configuration to NVRAM:
Router# copy running-config startup-config

Note You must always manually save the configuration settings to NVRAM whenever they are modified.

The following sample display includes a continuous listing of all interface configuration parameters
selected for Ethernet and synchronous serial interfaces. These parameters are shown in the order in
which they appear on your console terminal.

Tip Only one Ethernet and one synchronous serial interface are configured for this example.

Configuring interface parameters:

Configuring interface Ethernet0/0:


Is this interface in use? [no]: yes

Configure IP on this interface? [no]: yes

IP address for this interface: 10.1.1.10

Number of bits in subnet field [0]:


Class A network is 10.0.0.0, 0 subnet bits; mask is 255.0.0.0
Configure IPX on this interface? [no]:
Configure AppleTalk on this interface? [no]: no

Configuring interface Serial0/0:


Is this interface in use? [no]: yes

Configure IP on this interface? [no]: yes

Configure IP unnumbered on this interface? [no]:


IP address for this interface: 10.1.1.20

Number of bits in subnet field [0]:


Class A network is 10.0.0.0, 0 subnet bits; mask is 255.0.0.0
Configure IPX on this interface? [no]:
Configure AppleTalk on this interface? [no]:

The following configuration command script was created:

hostname Router

Cisco CMTS Router Basics


47
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Removing the Cable Interfaces

enable secret 5 $1$u8z3$PMYY8em./8sszhzk78p/Y0


enable password wilma
line vty 0 4
password s
snmp-server community public
!
ip routing
no vines routing
no ipx routing
no appletalk routing
no apollo routing
no decnet routing
no xns routing
no clns routing
no bridge 1

! Turn off IPX to prevent network conflicts.


interface Ethernet0/0
no ipx network
interface Ethernet0/1
no ipx network
!
interface Ethernet0/0
ip address 1.1.1.10 255.0.0.0
no mop enabled
!
interface serial0/0
ip address 1.1.1.20 255.0.0.0
ip route-cache cbus
no keepalive
!
!
router igrp 15
network 1.0.0.0
!
end

Use this configuration? [yes/no]: yes

[OK]
Use the enabled mode `configure' command to modify this configuration.

Press RETURN to get started!

Your Cisco uBR7200 series router is now minimally configured and is ready to use. Use the setup
command in provileged EXEC mode if you want to modify the parameters after the initial configuration.
To perform more complex configurations, use the configure privileged EXEC command in global
configuration mode.

Setup Facility Examples


In the following example, the upstream parameters for a cable interface line card in slot 5 are configured
and enabled. Press Return to accept the default.
Do you want to configure Cable 5/0 interface? [no]: yes
Downstream setting frequency: 531000000
For cable upstream [0]
Shut down this upstream? [yes/no]: no

Cisco CMTS Router Basics


48
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cable Interface with the Extended Setup Facility

Frequency: 33808000
Would you like to configure the DHCP server? [yes/no]: yes
IP address for the DHCP server [X.X.X.X]: 10.0.0.2
Configure IP on this interface? [yes]:
IP address for this interface [10.20.133.65]:
Subnet mask for this interface [255.0.0.0]: 255.255.255.248
Class A network is 10.0.0.0, 29 subnet bits; mask is /29
In this example, the input above generates the following command interface script:
interface Cable 5/0
no shutdown
cable downstream frequency 531000000
no shutdown
cable downstream modulation 64qam
cable downstream annex B
cable downstream interleave-depth 32
no cable upstream 0 shutdown
cable upstream 0 frequency 33808000
cable helper-address 10.0.0.2
ip address 10.20.133.65 255.255.255.248

Note Cable modems or set-top boxes with integrated cable modems are brought online when the utility is run.

Note For Dynamic Host Configuration Protocol (DHCP)/time of day (TOD)/Trivial File Transfer Protocol
(TFTP), a static route must exist to the host.

Configuring the Cable Interface with the Extended Setup Facility


The Setup facility creates an initial configuration. The basic management setup configures only enough
connectivity for management of the system. The Extended setup facility prompts you to configure each
interface on the system.
To invoke the configuration facility, use the following command:
Router# setup

The following is the System Configuration dialog:


Continue with configuration dialog? [yes/no]: yes

Identifying the Cable Interface Line Card

Identifying Cable Modem Line Cards


The following Cisco cable interfaces can be installed in a Cisco CMTS:
• The Cisco uBR7200 series router supports one downstream modulator and one upstream
demodulator.
– The Cisco uBR7200 series router supports the following defaults: QAM-256 at 40 MBps
downstream, and QAM-16 at 5 Mbps upstream.

Cisco CMTS Router Basics


49
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cable Interface with the Extended Setup Facility

– The card supports upstream channel widths of 200 kHz, 400 kHz, 800 kHz, 1.6 MHz, and
3.2 MHz.
– The card outputs +42 dBmV and +/- 2 dBmV.
– The downstream modulator has both an RF output, using the integrated upconverter, and an
intermediate frequency (IF) output, which must be connected to an external upconverter.

Identifying Cable Modem Line Card Slots


On the Cisco uBR7200 series router, the cable interface line card is fixed and is always slot 1. To display
information about a specific cable interface slot’s downstream channel, use the show interfaces cable
command with the CM card’s slot number and downstream port number in the following format:
show interfaces cable slot/downstream-port [downstream]

Use the slot number and downstream port number to display information about a downstream interface.
You can abbreviate the command to sh int c. The following example shows the display for upstream
channel port 0 on a Cisco uBR7200 series router:
Router# sh int c 5/0

To display information about a specific cable interface slot’s upstream channel, use the
show interfaces cable command. Include these CM card parameters:
• Slot number
• Downstream port number
• Upstream port number
Use this format:
show interfaces cable slot/downstream-port [upstream] upstream-port

Use the slot number, downstream port number, and upstream port number to display information about
an upstream interface. You can abbreviate the command to sh int c.
The following example shows the display for upstream channel port 0 in cable interface slot 3 of a
Cisco uBR7200 series router that is turned up:
Router# sh int c3/0 upstream

Configuring Global Parameters in Extended Setup


Step 1 Access the host by responding to the following prompt:
Enter host name [cmts]:

The enable secret password is used to protect access to privileged EXEC and configuration modes. This
password, after entered, becomes encrypted in the configuration.
Step 2 Respond to this prompt:
Enter enable secret [Use current secret]: aa

Next, the enable password is used when you do not specify an enable secret password, with some older
software versions, and some boot images.
Step 3 Respond to this prompt:

Cisco CMTS Router Basics


50
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cable Interface with the Extended Setup Facility

Enter enable password [rHoz]: bb

Next, use the virtual terminal password to protect access to the router over a network interface.
Step 4 Respond to this prompt:
Enter virtual terminal password [cc]: cc

The following system information appears.


Configure SNMP Network Management? [no]:
Configure IP? [yes]:
Configure IGRP routing? [yes]:
Your IGRP autonomous system number [1]:
Configure CLNS? [no]:
Configuring interface parameters:
Do you want to configure FastEthernet0/0 interface? [yes]:
Use the 100 Base-TX (RJ-45) connector? [yes]:
Operate in full-duplex mode? [no]:
Configure IP on this interface? [yes]: no
Do you want to configure Ethernet1/0 interface? [yes]: n
Do you want to configure Cable5/0 interface? [yes]:
Downstream setting frequency : 531000000
For cable upstream [0]
Shut down this upstream ? [yes/no]: no
Frequency : 33808000
Would you like to configure the DHCP server ? [yes/no]: yes
IP address for the DHCP server
[X.X.X.X]: 10.0.0.2
Configure IP on this interface? [no]: yes
IP address for this interface: 10.20.133.65
Subnet mask for this interface [255.0.0.0] : 255.255.255.248
Class A network is 10.0.0.0, 29 subnet bits; mask is /29

The following configuration command script is created:


interface cable5/0
ip address 10.20.133.65 255.255.255.248
no ip mroute-cache
no keepalive
cable insertion-interval 500
cable downstream annex B
cable downstream modulation 64qam
cable downstream interleave-depth 32
cable downstream frequency 531000000
cable upstream 0 frequency 33808000
cable upstream 0 power-level 0
no cable upstream 0 shutdown
cable helper-address 10.0.0.2

Note For modems to acquire an IP address, they must have direct access to DHCP, TFTP, or ToD servers, or
have a static route set.

Cisco CMTS Router Basics


51
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Configuring the Cisco uBR7200 Series Router Manually Using Configuration Mode

Configuring the Cisco uBR7200 Series Router Manually Using


Configuration Mode
You can configure the Cisco uBR7200 series router manually if you prefer not to use the Setup facility
or AutoInstall. Complete the following steps:

Step 1 Connect a console terminal to the console port on the I/O controller.
Step 2 When asked if you want to enter the initial dialog, respond no to go into the normal operating mode of
the router:
Would you like to enter the initial dialog? [yes]: no

Step 3 After a few seconds, the user EXEC prompt (Router>) appears. Type enable to enter enable mode
(configuration changes can be made only in enable mode):
Router> enable

The prompt changes to the enable mode (also called privileged EXEC) prompt:
Router#

Step 4 Enter the configure terminal command (conf t)at the enable prompt to enter configuration mode from
the terminal:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#

Tip To see a list of the configuration commands available to you, enter ? at the prompt or type help while in
configuration mode.

Step 5 At the Router(config)# prompt, enter the interface type slot/port command to enter the interface
configuration mode:
Router(config)# interface cable slot/port
Router(config-if)#

Step 6 Set the downstream center frequency to reflect the digital carrier frequency of the downstream RF carrier
(the channel) for the downstream port:
Router(config-int)# cable downstream frequency down-freq-hz

Note This command has no effect on the external upconverter. It is informational only.

Step 7 Activate the downstream port on the cable interface line card to support digital data transmission over
the hybrid fiber-coaxial network:
Router(config-int)# no shutdown

Step 8 Enter the fixed center frequency in Hz for your downstream RF carrier and the port number:
Router(config-int)# cable upstream port frequency up-freq-hz

Note Be sure not to select an upstream frequency that interferes with that used for any other upstream
application in your cable plant.

Cisco CMTS Router Basics


52
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Saving Your Configuration Settings

Step 9 Repeat Step 8 for each upstream port on the cable interface line card.
Step 10 Activate the upstream port:
Router(config-int)# no cable upstream port shutdown

Step 11 Repeat Step 10 to activate each port used on your cable interface line card.
Step 12 Exit to return to the configuration mode:
Router(config-if)# exit
Router(config)#

Step 13 Enter the next interface to configure, following Step 6 through Step 12, or type exit to return to enable
mode.
Router(config)# exit
Router#
%SYS-5-CONFIG_I: Configured from console by console#

Step 14 Save the configuration to NVRAM:


Router# copy running-config startup-config

Saving Your Configuration Settings


To store the configuration or changes to your startup configuration in NVRAM, enter the
copy running-config startup-config command at the Router# prompt:
Router# copy running-config startup-config

This command saves the configuration settings you set using configuration mode, the Setup facility, or
AutoInstall.

Tip If you do not save your settings, your configuration will be lost the next time you reload the router.

Reviewing Your Settings and Configurations


You can check your settings and review any changes to your configuration using various software
commands.
• To view information specific to the hardware and cable interface configuration on your
Cisco uBR7200 series router, use show commands.
– Use the following command to verify the downstream center frequency:
Router# show controllers cable slot/port downstream

– Use the following command to verify the current value of an upstream port frequency:
Router# show controllers cable slot/port upstream

– Use the following command to check the value of the settings you entered:
Router# show running-config

Cisco CMTS Router Basics


53
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Reviewing Your Settings and Configurations

• To review changes you make to the configuration, use the EXEC show startup-config command to
display the information stored in NVRAM.

Viewing Sample Configuration Files


This section provides examples of Cisco uBR7200 series router configuration files. To view the current
configuration of a Cisco uBR7200 series router, enter the show running-config command at the
command-line interface (CLI) prompt in EXEC mode or privileged EXEC mode.

Baseline Privacy Interface Configuration Files


The Cisco uBR7200 series CMTS supports 56-bit and 40-bit encryption and decryption; 56 bit is the
default. After you choose a CMTS image that supports Baseline Privacy Interface (BPI), BPI is enabled
by default for the Cisco uBR7200 series CMTS. Key commands that appear in the
Cisco uBR7200 series router configuration file that denote that encryption and decryption are supported
include:
• int cable 5/0
• cable privacy kek grace-time 800
• cable privacy kek life-time 750000
• cable privacy tek grace-time 800
• cable privacy tek life-time 56000
• cable privacy enable
• cable privacy mandatory

Note The cable interface must also support encryption and decryption.

When Baseline Privacy is enabled, the Cisco uBR7200 series router routes encrypted and decrypted
packets from a host or peer to another host or peer. BPI is configured with key encryption keys (KEKs)
and traffic encryption keys (TEKs). A KEK is assigned to a CM, based on the CM’s service identifier
(SID), and permits the CM to connect to the Cisco uBR7200 series router when Baseline Privacy is
activated. The TEK is assigned to a CM when its KEK has been established. The TEK is used to encrypt
data traffic between the CM and the Cisco uBR7200 series router.
KEKS and TEKs can be set for Baseline Privacy on the HFC network to expire based on a grace-time
or a life-time value, defined in seconds. A grace-time value assigns a temporary key to a CM to access
the network. A life-time value assigns a more permanent key to a CM. Each CM that has a life-time
value assigned requests a new lifetime key from the Cisco uBR7200 series router before the current one
expires.
To set the duration in seconds for KEK or TEK grace-time or life-time, use the following commands
in global configuration mode. To restore the default values, use the no form of each command.
cable privacy kek {grace-time [seconds] | life-time [seconds]}
no cable privacy kek {grace-time | life-time}

cable privacy tek {grace-time [seconds] | life-time [seconds]}


no cable privacy tek {grace-time | life-time}

Cisco CMTS Router Basics


54
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Reviewing Your Settings and Configurations

Syntax Description grace-time seconds (Optional) Length of key encryption grace-time in seconds. Valid range is
300 to 1800 seconds. The default grace-time value is 600 seconds.
life-time seconds (Optional) Length of the key encryption life-time in seconds.Valid range is
86,400 to 604,8000. The default life-time value is 604800 seconds.

Tip Use the show cable modem command to identify a CM with encryption and decryption enabled. The
online(pk) output of this command reveals a CM that is registered with BPI enabled and a KEK assigned.
The online(pt) output reveals a CM that is registered with BPI enabled and a TEK assigned.

Should you want to change the Cisco uBR7200 series default of 56-bit encryption and decryption to
40-bit, use the “40 bit DES” option:
Router(config-if)# cable privacy ?
40-bit-des select 40 bit DES
^^^^^^^^^^
authenticate-modem turn on BPI modem authentication
authorize-multicast turn on BPI multicast authorization
kek KEK Key Parms
mandatory force privacy be mandatory
tek TEK Key Parms

Software then generates a 40-bit DES key, where the DES key that is generated and returned masks the
first 16 bits of the 56-bit key to zero in software. To return to 56-bit encryption and decryption after
changing to 40-bit, enter the no command in front of the “40 bit des” option.

Cisco CMTS Router Basics


55
Configuring the Cisco uBR7200 Series Universal Broadband Routers for the First Time
Reviewing Your Settings and Configurations

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of
Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The
use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.

© 2008 Cisco Systems, Inc. All rights reserved.

Cisco CMTS Router Basics


56
Performing OIR of Cable Interface Line Cards on
the Cisco CMTS Routers

First Published: February 14, 2008


Last Updated: February 9, 2009

The Cisco uBR7200 series and Cisco uBR10012 universal broadband routers support online insertion
and removal (OIR) of cable interface line cards, but have different requirements. The following sections
describe this support for each of the platforms.

Finding Feature Information


Your software release may not support all the features documented in this module. For the latest feature
information and caveats, see the release notes for your platform and software release.
Use Cisco Feature Navigator to find information about platform support and Cisco IOS, Catalyst OS,
and Cisco IOS XE software image support. To access Cisco Feature Navigator, go to
http://www.cisco.com/go/cfn. An account on Cisco.com is not required.

OIR of Cable Interface Line Cards on the Cisco uBR7200 Series


Universal Broadband Routers
Technically, the Cisco uBR7200 series universal broadband routers support true online insertion and
removal (OIR), or "hot swapping," of cable interface line cards only when exchanging cable interface
line cards of the exact same type (for example, exchanging a Cisco uBR-MC28U card for another Cisco
uBR-MC28U card). Under these conditions, no reload of the router is required.

Caution When you OIR different types of cable interface line cards (for example, a Cisco uBR-MC16U card
replaced by a Cisco uBR-MC16X card, or Cisco uBR-MC16U card replaced by a Cisco uBR-MC28U
card), you not only might have to reconfigure the interfaces, we recommend that you reload the router.

Cisco Systems, Inc.


www.cisco.com
Performing OIR of Cable Interface Line Cards on the Cisco CMTS Routers
OIR of Cable Interface Line Cards on the Cisco uBR10012 Universal Broadband Router

OIR of Cable Interface Line Cards on the Cisco uBR10012


Universal Broadband Router
To perform an OIR of cable interface line cards on the Cisco uBR10012 router, do the following steps:

Step 1 From global configuration mode, enter the cr10k card oir-compatibility command for the cable
interface line card that you want to OIR, as shown in the following example:
Router(config)# cr10k card 8/0 oir-compatibility

This command helps preserve the configuration and performs some internal synchronization to make
sure that the OIR runs successfully.

Note The console log displays a new message appears whenever a line card type has been replaced. For
example, if the MC520U-D in subslot 8/1 is replaced by an MC520S-D, the following message is
displayed:
%UBR10K-6-COMPAT_NEW_CARD: The 5cable-mc520u-d in slot 8/1 has been replaced by a
5cable-mc520s-d
This message appears when an OIR operation involves two different types of MC520 line cards.

Caution The console log message does not appear for cards other than the MC520S/U/H. It also does not appear
if the OIR operation involves identical MC520 card types. For instance, it will not appear if an MC520U
is replaced by another MC520U. In such cases, you not only might have to reconfigure the interfaces,
we recommend that you reload the router.

Step 2 Save the configuration to ensure the transition, as shown in the following example:
Router# copy running-config startup-config

Step 3 Turn the power off to the line card using the cable power off command for the slot that is being replaced
as shown in the following example:
Router# cable power off 8/0
Line Card 8/0 is POWERED OFF

This powers off the line card gracefully.

Step 4 Before removing the card, verify that the proper grounding instructions have been followed for the card.
For more information about preventing electrostatic discharge (ESD) damage, refer to the document at:
http://www.cisco.com/warp/public/109/cable-linecard-handling.pdf
Step 5 Remove the line card.
Step 6 Replace it with the new line card in the slot.
Step 7 Enter the cable power on command to power up the line card, as shown in the following example:
Router# cable power on 8/0

Step 8 Enter the show interface cable command and verify that the card and line protocol is “up” as shown in
the following example:
Router# show interface cable 8/0/0
Cable8/0/0 is up, line protocol is up
Hardware is BCM3210 ASIC, address is 000a.13e8.1ca8 (bia 000a.13e8.1a60)

Cisco CMTS Router Basics


58
Performing OIR of Cable Interface Line Cards on the Cisco CMTS Routers
OIR of Cable Interface Line Cards on the Cisco uBR10012 Universal Broadband Router

Internet address is 10.1.1.3/24


MTU 1500 bytes, BW 27000 Kbit, DLY 1000 usec, rely 255/255, load 1/255
Encapsulation, loopback not set, keepalive not set
ARP type: ARPA, ARP Timeout 04:00:00
Last input 4d07h, output 00:00:00, output hang never
Last clearing of "show interface" counters never
Queueing strategy: fifo
Output queue 0/40, 0 drops; input queue 0/75, 0 drops
5 minute input rate 1834000 bits/sec, 2385 packets/sec
5 minute output rate 1982000 bits/sec, 2431 packets/sec
24461542 packets input, 2348214388 bytes, 0 no buffer
Received 1979 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
24854257 packets output, 2536222931 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 output buffer failures, 0 output buffers swapped out

Step 9 Enter the show controllers cable command and verify the hardware status as shown in the following
example:
Router# show controllers cable 8/0/0
Cable8/0/0 JIB hardware status:
JIB Downstream port Enabled
JIB Upstream port 0 Enabled
JIB Upstream port 1 Enabled
JIB Upstream port 2 Enabled
JIB Upstream port 3 Enabled
Cable8/0/0 Upconverter is Enabled Output is Enabled
Model: 74-3153-02 Serial Number: 0WAV090200A1 CLEI Code: FFFFFFFFFF
HW Rev: PC2D0109 SW Rev: 203, NVRAM Rev: 021 ECI numb

Step 10 Verify the configuration with the show running-configuration command as shown in the following
example:
Router# show running-configuration

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of
Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The
use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.

© 2009 Cisco Systems, Inc. All rights reserved.

Cisco CMTS Router Basics


59
Performing OIR of Cable Interface Line Cards on the Cisco CMTS Routers
OIR of Cable Interface Line Cards on the Cisco uBR10012 Universal Broadband Router

Cisco CMTS Router Basics


60
Unique Device Identifier Retrieval for the Cisco
CMTS

First Publised: February 14, 2008


Last Updated: February 9, 2009

The Unique Device Identifier Retrieval (UDI retrieval) feature provides the ability to retrieve and display
the Unique Device Identifier (UDI) information from any Cisco product that has electronically stored
such identity information.
Cisco IOS Release 12.2(33)SCA integrates support for this feature on the Cisco CMTS routers. This
feature is also supported in Cisco IOS Release 12.3BC, and this document contains information that
references many legacy documents related to Cisco IOS 12.3BC. In general, any references to Cisco IOS
Release 12.3BC also apply to Cisco IOS Release 12.2SC.

Finding Support Information for Platforms and Cisco IOS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image
support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on
Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at
the login dialog box and follow the instructions that appear.

Contents
• Prerequisites for Unique Device Identifier Retrieval, page 62
• Information About Unique Device Identifier Retrieval, page 62
• How to Retrieve the Unique Device Identifier, page 63
• Configuration Examples for Unique Device Identifier Retrieval, page 69
• Additional References, page 69
• Command Reference, page 70

Cisco Systems, Inc.


www.cisco.com
Unique Device Identifier Retrieval for the Cisco CMTS
Prerequisites for Unique Device Identifier Retrieval

Prerequisites for Unique Device Identifier Retrieval


In order to use UDI retrieval, the Cisco product in use must be UDI-enabled. A UDI-enabled Cisco
product supports five required Entity MIB objects. The five Entity MIB v2 (RFC-2737) objects are as
follows:
• entPhysicalName
• entPhysicalDescr
• entPhysicalModelName
• entPhysicalHardwareRev
• entPhysicalSerialNum
Although the show inventory command may be available, using that command on devices that are not
UDI-enabled will likely produce no output.

Information About Unique Device Identifier Retrieval


Before using the UDI Retrieval feature, you should understand the following concepts:
• Unique Device Identifier Overview, page 62
• Benefits of the Unique Device Identifier Retrieval Feature, page 63
• Product Item Descriptor (PID) for Cable Products, page 63

Unique Device Identifier Overview


Each identifiable product is an entity, as defined by the Entity MIB (RFC-2737) and its supporting
documents. Some entities, such as a chassis, will have subentities like slots. An Ethernet switch might
be a member of a superentity like a stack. Most Cisco entities that are orderable products will leave the
factory with an assigned UDI. The UDI information is printed on a label that is affixed to the physical
hardware device, and it is also stored electronically on the device in order to facilitate remote retrieval.
A UDI consists of the following elements:
• Product identifier (PID)
• Version identifier (VID)
• Serial number (SN)
The PID is the name by which the product can be ordered; it has been historically called the “Product
Name” or “Part Number.” This is the identifier that one would use to order an exact replacement part.
The VID is the version of the product. Whenever a product has been revised, the VID will be
incremented. The VID is incremented according to a rigorous process derived from Telcordia
GR-209-CORE, an industry guideline that governs product change notices.
The SN is the vendor-unique serialization of the product. Each manufactured product will carry a unique
serial number assigned at the factory, which cannot be changed in the field. This is the means by which
to identify an individual, specific instance of a product.

Cisco CMTS Router Basics


62
Unique Device Identifier Retrieval for the Cisco CMTS
How to Retrieve the Unique Device Identifier

Benefits of the Unique Device Identifier Retrieval Feature


• Identifies individual Cisco products in your networks.
• Reduces operating expenses for asset management through simple, cross-platform, consistent
identification of Cisco products.
• Identifies PIDs for replaceable products.
• Facilitates discovery of products subject to recall or revision.
• Automates Cisco product inventory (capital and asset management).
• Provides a mechanism to determine the entitlement level of a Cisco product for repair and
replacement service.

Product Item Descriptor (PID) for Cable Products


The following is a list of product numbers for cable products. These products can be identified using
UDI software.

Cisco uBR10012 Cisco uBR7200VXR Other


UBR10012 (chassis) UBR-7246VXR (chassis) UBR7111 (chassis)
UBR10-DSPL= UBR-MC28U UBR7114 (chassis)
PRE2 UBR-MC28X UBR7111E (chassis)
UBR10-PWR-AC UBR-MC16U UBR7114E (chassis)
UBR10-PWR-DC UBR-MC16X —
UBR10-1GE UBR7200-NPE-G1 NPE-400
UBR10-1OC12/P-SMI UBR7200-I/O-2FE/E NPE-G1
UBR10-TCC+ -T1 — —
UBR10-MC5X20U-D — —
UBR10-1GE — —

How to Retrieve the Unique Device Identifier


This section contains the following task:
• Retrieving the Unique Device Identifier, page 63 (required)

Retrieving the Unique Device Identifier


Perform this task to retrieve and display identification information for a Cisco product.

SUMMARY STEPS

1. enable
2. show inventory [raw]

Cisco CMTS Router Basics


63
Unique Device Identifier Retrieval for the Cisco CMTS
How to Retrieve the Unique Device Identifier

DETAILED STEPS

Step 1 enable
Enters privileged EXEC mode. Enter your password if prompted.
Router> enable

Step 2 show inventory [raw]


Enter the show inventory command to retrieve and display information about all of the Cisco products
installed in the networking device that are assigned a PID, VID, and SN. If a Cisco entity is not assigned
a PID, that entity is not retrieved or displayed.
Router# show inventory

NAME: "", DESCR: "uBR10000 chassis, Hw Serial#: SPE08450FQA, Hw Revision: 1.1"


PID: uBR10000 , VID: 1.1, SN: SPE08450FQA
NAME: "slot 0/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "", DESCR: "Routing Processor"
PID: Routing Processor , VID: 1.0, SN: CAT09030GVK
NAME: "PRE_A:FastEthernet0/0/0", DESCR: "Network Management Ethernet"
PID: Network Management Ethernet, VID: , SN:
NAME: "", DESCR: "Temperature Sensor"
PID: Temperature Sensor, VID: , SN:
NAME: "", DESCR: "Forwarding Processor"
PID: Forwarding Processor, VID: 1.0, SN: CAT09030GBL
NAME: "slot 0/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 1/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 1/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 2/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "", DESCR: "1gigethernet-1"
PID: 1gigethernet-1 , VID: 1.0, SN: CAB0542KX74
NAME: "GigabitEthernet2/0/0", DESCR: "Gigabit Ethernet MAC Controller"
PID: Gigabit Ethernet MAC Controller, VID: Unknown Rev, SN:
NAME: "slot 2/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 3/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "", DESCR: "1oc12pos-1"
PID: 1oc12pos-1 , VID: 2.0, SN: CAB0437ECQU
NAME: "POS3/0/0", DESCR: "Skystone 4302 Sonet Framer"
PID: Skystone 4302 Sonet Framer, VID: 0xFFFF, SN:
NAME: "slot 3/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 4/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 4/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 5/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 5/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "", DESCR: "MC520S_D_connector"
PID: MC520S_D_connector, VID: 1.1, SN: CAT08510MM0
NAME: "Cable5/1-MAC0", DESCR: "UBR10000 CLC"
PID: UBR10000 CLC , VID: 0x0 , SN:
NAME: "Cable5/1-MAC1", DESCR: "UBR10000 CLC"

Cisco CMTS Router Basics


64
Unique Device Identifier Retrieval for the Cisco CMTS
How to Retrieve the Unique Device Identifier

PID: UBR10000 CLC , VID: 0x0 , SN:


NAME: "Cable5/1-MAC2", DESCR: "UBR10000 CLC"
PID: UBR10000 CLC , VID: 0x0 , SN:
NAME: "Cable5/1-MAC3", DESCR: "UBR10000 CLC"
PID: UBR10000 CLC , VID: 0x0 , SN:
NAME: "Cable5/1-MAC4", DESCR: "UBR10000 CLC"
PID: UBR10000 CLC , VID: 0x0 , SN:
NAME: "Cable5/1-US0", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US1", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US2", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US3", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US4", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US5", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US6", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US7", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US8", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US9", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US10", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US11", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US12", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US13", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US14", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US15", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US16", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US17", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US18", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US19", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-DS0", DESCR: "BCM3033 PHY"
PID: BCM3033 PHY , VID: 3033, SN:
NAME: "Cable5/1-DS1", DESCR: "BCM3033 PHY"
PID: BCM3033 PHY , VID: 3033, SN:
NAME: "Cable5/1-DS2", DESCR: "BCM3033 PHY"
PID: BCM3033 PHY , VID: 3033, SN:
NAME: "Cable5/1-DS3", DESCR: "BCM3033 PHY"
PID: BCM3033 PHY , VID: 3033, SN:
NAME: "Cable5/1-DS4", DESCR: "BCM3033 PHY"
PID: BCM3033 PHY , VID: 3033, SN:
NAME: "slot 6/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 6/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 7/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 7/1/0", DESCR: "Chassis Slot"

Cisco CMTS Router Basics


65
Unique Device Identifier Retrieval for the Cisco CMTS
How to Retrieve the Unique Device Identifier

PID: Chassis Slot , VID: , SN:


NAME: "slot 8/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 8/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "", DESCR: "Container for Power Supply"
PID: Container for Power Supply, VID: , SN:
NAME: "", DESCR: "Power Supply"
PID: Power Supply , VID: , SN:
NAME: "", DESCR: "Power Supply"
PID: Power Supply , VID: , SN:
NAME: "", DESCR: "Container for Fan Tray"
PID: Container for Fan Tray, VID: , SN:
NAME: "", DESCR: "Fan Tray"
PID: Fan Tray , VID: , SN:
NAME: "", DESCR: "Fan"
PID: Fan , VID: , SN:
NAME: "", DESCR: "Fan"
PID: Fan , VID: , SN:
NAME: "", DESCR: "Backplane"
PID: Backplane , VID: 1.1, SN: SPE08450FQA

For diagnostic purposes, the show inventory command can be used with the raw keyword to display
every RFC 2737 entity including those without a PID, UDI, or other physical identification.

Note The raw keyword option is primarily intended for troubleshooting problems with the show inventory
command itself.

Router# show inventory raw

NMS-RACK9-UBR10K-1#sh inventory raw


NAME: "", DESCR: "uBR10000 chassis, Hw Serial#: SPE08450FQA, Hw Revision: 1.1"
PID: uBR10000 , VID: 1.1, SN: SPE08450FQA
NAME: "slot 0/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "", DESCR: "Routing Processor"
PID: Routing Processor , VID: 1.0, SN: CAT09030GVK
NAME: "PRE_A:FastEthernet0/0/0", DESCR: "Network Management Ethernet"
PID: Network Management Ethernet, VID: , SN:
NAME: "", DESCR: "Temperature Sensor"
PID: Temperature Sensor, VID: , SN:
NAME: "", DESCR: "Forwarding Processor"
PID: Forwarding Processor, VID: 1.0, SN: CAT09030GBL
NAME: "slot 0/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 1/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 1/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 2/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "", DESCR: "1gigethernet-1"
PID: 1gigethernet-1 , VID: 1.0, SN: CAB0542KX74
NAME: "GigabitEthernet2/0/0", DESCR: "Gigabit Ethernet MAC Controller"
PID: Gigabit Ethernet MAC Controller, VID: Unknown Rev, SN:
NAME: "slot 2/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 3/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "", DESCR: "1oc12pos-1"
PID: 1oc12pos-1 , VID: 2.0, SN: CAB0437ECQU

Cisco CMTS Router Basics


66
Unique Device Identifier Retrieval for the Cisco CMTS
How to Retrieve the Unique Device Identifier

NAME: "POS3/0/0", DESCR: "Skystone 4302 Sonet Framer"


PID: Skystone 4302 Sonet Framer, VID: 0xFFFF, SN:
NAME: "slot 3/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 4/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 4/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 5/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 5/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "", DESCR: "MC520S_D_connector"
PID: MC520S_D_connector, VID: 1.1, SN: CAT08510MM0
NAME: "Cable5/1-MAC0", DESCR: "UBR10000 CLC"
PID: UBR10000 CLC , VID: 0x0 , SN:
NAME: "Cable5/1-MAC1", DESCR: "UBR10000 CLC"
PID: UBR10000 CLC , VID: 0x0 , SN:
NAME: "Cable5/1-MAC2", DESCR: "UBR10000 CLC"
PID: UBR10000 CLC , VID: 0x0 , SN:
NAME: "Cable5/1-MAC3", DESCR: "UBR10000 CLC"
PID: UBR10000 CLC , VID: 0x0 , SN:
NAME: "Cable5/1-MAC4", DESCR: "UBR10000 CLC"
PID: UBR10000 CLC , VID: 0x0 , SN:
NAME: "Cable5/1-US0", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US1", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US2", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US3", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US4", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US5", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US6", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US7", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US8", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US9", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US10", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US11", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US12", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US13", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US14", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US15", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US16", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US17", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US18", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:
NAME: "Cable5/1-US19", DESCR: "LBT4522 PHY"
PID: LBT4522 PHY , VID: 4522, SN:

Cisco CMTS Router Basics


67
Unique Device Identifier Retrieval for the Cisco CMTS
How to Retrieve the Unique Device Identifier

NAME: "Cable5/1-DS0", DESCR: "BCM3033 PHY"


PID: BCM3033 PHY , VID: 3033, SN:
NAME: "Cable5/1-DS1", DESCR: "BCM3033 PHY"
PID: BCM3033 PHY , VID: 3033, SN:
NAME: "Cable5/1-DS2", DESCR: "BCM3033 PHY"
PID: BCM3033 PHY , VID: 3033, SN:
NAME: "Cable5/1-DS3", DESCR: "BCM3033 PHY"
PID: BCM3033 PHY , VID: 3033, SN:
NAME: "Cable5/1-DS4", DESCR: "BCM3033 PHY"
PID: BCM3033 PHY , VID: 3033, SN:
NAME: "slot 6/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 6/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 7/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 7/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 8/0/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "slot 8/1/0", DESCR: "Chassis Slot"
PID: Chassis Slot , VID: , SN:
NAME: "", DESCR: "Container for Power Supply"
PID: Container for Power Supply, VID: , SN:
NAME: "", DESCR: "Power Supply"
PID: Power Supply , VID: , SN:
NAME: "", DESCR: "Power Supply"
PID: Power Supply , VID: , SN:
NAME: "", DESCR: "Container for Fan Tray"
PID: Container for Fan Tray, VID: , SN:
NAME: "", DESCR: "Fan Tray"
PID: Fan Tray , VID: , SN:
NAME: "", DESCR: "Fan"
PID: Fan , VID: , SN:
NAME: "", DESCR: "Fan"
PID: Fan , VID: , SN:
NAME: "", DESCR: "Backplane"
PID: Backplane , VID: 1.1, SN: SPE08450FQA

NAME: "fan 1", DESCR: "Fan"


PID: , VID: , SN:
NAME: "fan 2", DESCR: "Fan"
PID: , VID: , SN:
NAME: "Backplane", DESCR: "Backplane"
PID: , VID: , SN: SPE08450FQA

Troubleshooting Tips
If any of the Cisco products do not have an assigned PID, the output may display incorrect PIDs and the
VID and SN elements may be missing, as in the following example.
NAME: "POS3/0/0", DESCR: "Skystone 4302 Sonet Framer"
PID: FastEthernet, VID: , SN:

NAME: "Serial1/0", DESCR: "M4T"


PID: M4T , VID: , SN:

Cisco CMTS Router Basics


68
Unique Device Identifier Retrieval for the Cisco CMTS
Configuration Examples for Unique Device Identifier Retrieval

In the sample output, the PID is exactly the same as the product description. The UDI is designed for use
with new Cisco products that have a PID assigned. UDI information on older Cisco products is not
always reliable.

Configuration Examples for Unique Device Identifier Retrieval


There are no configuration examples for the UDI Retrieval feature. For sample display output from the
show inventory command, see the “Retrieving the Unique Device Identifier” section on page 63.

Additional References
This section provides references related to the UDI Retrieval feature.

Related Documents

Related Topic Document Title


Information about managing configuration files • Cisco IOS Configuration Fundamentals Configuration Guide
Commands for showing interface statistics • Cisco IOS Interface Command Reference

Standards

Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.

MIBs

MIBs MIBs Link


CISCO-ENTITY-ASSET-MIB To locate and download MIBs for selected platforms, Cisco IOS
releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs

Cisco CMTS Router Basics


69
Unique Device Identifier Retrieval for the Cisco CMTS
Command Reference

RFCs

RFCs Title
RFC 2737 Entity MIB (Version 2)

Technical Assistance

Description Link
Technical Assistance Center (TAC) home page, http://www.cisco.com/cisco/web/support/index.html
containing 30,000 pages of searchable technical
content, including links to products, technologies,
solutions, technical tips, and tools. Registered
Cisco.com users can log in from this page to access
even more content.

Command Reference
The following commands are introduced or modified in the feature or features documented in this
module. For information about these commands, see the Cisco IOS Cable Command Reference at
http://www.cisco.com/en/US/docs/ios/cable/command/reference/cbl_book.html. For information about
all Cisco IOS commands, go to the Command Lookup Tool at
http://tools.cisco.com/Support/CLILookup or to the Cisco IOS Master Commands List.
• show inventory

CCVP, the Cisco logo, and Welcome to the Human Network are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is
a service mark of Cisco Systems, Inc.; and Access Registrar, Aironet, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco
Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity,
Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS,
iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networkers,
Networking Academy, Network Registrar, PIX, ProConnect, ScriptShare, SMARTnet, StackWise, The Fastest Way to Increase Your Internet Quotient,
and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.

All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (0711R)

Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco CMTS Router Basics


70
Cisco CMTS Router Service Features
Configuration Guide
Cisco IOS Release 12.2SC

Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883

Text Part Number: OL-27605-01


THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)

Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.

Cisco CMTS Router Service Features Configuration Guide


©2009-2012 Cisco Systems, Inc. All rights reserved.
CONTENTS

Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers 1
Finding Feature Information 1
Contents 2
Prerequisites for Advanced-Mode DSG Issue 1.2 2
Restrictions for Advanced-Mode DSG Issue 1.2 3
Information About Advanced-Mode DSG Issue 1.2 4
How to Configure Advanced-Mode DSG Issue 1.2 7
How to Monitor and Debug the Advanced-mode DOCSIS Set-Top Gateway Feature 29
Configuration Examples for Advanced-Mode DSG 41
Additional References 45
Feature Information for Advanced-Mode DSG 1.2 for the Cisco CMTS Routers 46

Call Home Feature for the Cisco CMTS Routers 49


Finding Feature Information 49
Contents 49
Prerequisites for the Call Home Feature for the Cisco CMTS Routers 50
Information About the Call Home Feature for the Cisco CMTS Routers 50
Where to Go Next 78
Additional References 78
Feature Information for the Call Home Feature for the Cisco CMTS Routers 80

Cisco Network Registrar for the Cisco CMTS Routers 81


Servers Required on the HFC Network 82
Cisco Network Registrar Description 83
Overview of DHCP Using CNR 84
How Cisco Universal Broadband Routers and Cable Modems Work 84
DHCP Fields and Options for Cable Modems 85
Cisco Network Registrar Sample Configuration 86
Overview of Scripts 89
Placement of Scripts 90
Activating Scripts in Cisco Network Registrar 90
Configuring the Cisco CMTS Routers to Use Scripts 90
Configuring the System Default Policy 91

Cisco CMTS Router Service Features Configuration Guide


OL-27605-01 iii
Contents

Creating Selection Tag Scopes 91


Creating Network Scopes 92
Creating Policies for Class of Service or for Upgrading Cable Modem Cisco IOS Images 93
CNR Steps to Support Subinterfaces 93
Additional References 94

DHCP, ToD, and TFTP Services for the CMTS Routers 97


Contents 97
Prerequisites for DHCP, ToD, and TFTP Services 98
Restrictions for DHCP, ToD, and TFTP Services 98
Information About DHCP, ToD, and TFTP Services 98
How to Configure DHCP, ToD, and TFTP Services 107
Configuration Examples 129
Additional References 143
Feature Information for the DHCP, ToD, and TFTP Services for the CMTS Routers 147

Cisco CMTS Router Service Features Configuration Guide


iv OL-27605-01
Advanced-Mode DOCSIS Set-Top Gateway 1.2
for the Cisco CMTS Routers

First Published: February 14, 2008


Last Updated: February 9, 2009

Note Cisco IOS Release 12.2(33)SCA integrates support for this feature on the Cisco CMTS routers. This
feature is also supported in Cisco IOS Release 12.3BC, and this document contains information that
references many legacy documents related to Cisco IOS 12.3BC. In general, any references to
Cisco IOS Release 12.3BC also apply to Cisco IOS Release 12.2SC.

The Advanced-Mode DOCSIS Set-Top Gateway (A-DSG) Issue 1.2 introduces support for the latest
DOCSIS Set-Top specification from CableLabs™, to include the following enhancements:
• DOCSIS Set-top Gateway (DSG) Interface Specification
• A-DSG 1.2 introduces support for the DOCS-DSG-IF MIB.
Cisco A-DSG 1.2 is certified by CableLabs™, and is a powerful tool in support of latest industry
innovations. A-DSG 1.2 offers substantial support for enhanced DOCSIS implementation in the
broadband cable environment. The set-top box (STB) dynamically learns the overall environment from
the Cisco CMTS router, to include MAC address, traffic management rules, and classifiers.

Finding Feature Information


Your software release may not support all the features documented in this module. For the latest feature
information and caveats, see the release notes for your platform and software release. To find information
about the features documented in this module, and to see a list of the releases in which each feature is
supported, see the “Feature Information for Advanced-Mode DSG 1.2 for the Cisco CMTS Routers” section
on page 46.
Use Cisco Feature Navigator to find information about platform support and Cisco software image
support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on
Cisco.com is not required.

Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
Contents

Contents
• Prerequisites for Advanced-Mode DSG Issue 1.2, page 2
• Restrictions for Advanced-Mode DSG Issue 1.2, page 3
• Information About Advanced-Mode DSG Issue 1.2, page 4
• How to Configure Advanced-Mode DSG Issue 1.2, page 7
• How to Monitor and Debug the Advanced-mode DOCSIS Set-Top Gateway Feature, page 29
• Configuration Examples for Advanced-Mode DSG, page 41
• Additional References, page 45
• Feature Information for Advanced-Mode DSG 1.2 for the Cisco CMTS Routers, page 46

Prerequisites for Advanced-Mode DSG Issue 1.2


Table 1 shows the hardware compatibility prerequisites for the A-DSG for the Cisco CMTS Routers
feature.

Note The hardware components introduced in a given Cisco IOS Release are supported in all subsequent
releases unless otherwise specified.

Table 1 A-DSG for the Cisco CMTS Routers Hardware Compatibility Matrix

CMTS Platform Processor Engine Cable Interface Cards


Cisco uBR10012 Cisco IOS Release 12.2(33)SCA and Cisco IOS Release 12.2(33)SCA and later
Universal Broadband later • Cisco uBR10-MC5X20S/U/H
Router • PRE2
Cisco IOS Release 12.2(33)SCC and later
Cisco IOS Release 12.2(33)SCB and • Cisco UBR-MC20X20V
later
• PRE4 Cisco IOS Release 12.2(33)SCE and later
• Cisco uBR-MC3GX60V1
Cisco uBR7246VXR Cisco IOS Release 12.2(33)SCA and Cisco IOS Release 12.2(33)SCA and later
Universal Broadband later • Cisco uBR-MC28U/X
Router • NPE-G1
• Cisco uBR-MC16U/X
• NPE-G2
Cisco IOS Release 12.2(33)SCD and later
• Cisco uBR-MC88V2

Cisco CMTS Router Service Features Configuration Guide


2
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
Restrictions for Advanced-Mode DSG Issue 1.2

Table 1 A-DSG for the Cisco CMTS Routers Hardware Compatibility Matrix

CMTS Platform Processor Engine Cable Interface Cards


Cisco uBR7225VXR Cisco IOS Release 12.2(33)SCA and Cisco IOS Release 12.2(33)SCA and later
Universal Broadband later • Cisco uBR-E-28U
Router • NPE-G1
• Cisco uBR-E-16U
Cisco IOS Release 12.2(33)SCD and • Cisco uBR-MC28U/X
later • Cisco uBR-MC16U/X
• NPE-G2
Cisco IOS Release 12.2(33)SCD and later
• Cisco uBR-MC88V2
1. Cisco uBR3GX60V cable interface line card is compatible only with PRE4.
2. You must use NPE-G2 with the Cisco uBR-MC88V cable interface line card.

Restrictions for Advanced-Mode DSG Issue 1.2


This section contains restrictions that are specific to A-DSG 1.2 on a Cisco CMTS router.
• DSG Configuration File Transfer Operations, page 3
• Multicast Configuration Restrictions, page 3
• NAT for DSG Unicast-only Mapping, page 4
• PIM and SSM for Multicast, page 4

DSG Configuration File Transfer Operations


DSG 1.2 does not support the copying of a DSG configuration file from a TFTP server, file system, or
bootflash to the running configuration.
Previously, with DSG 1.1, when copying the DSG configuration file from a file system or TFTP server
to the running configuration, DSG rule error checking may disable a previously configured and valid
DSG tunnel configuration. This issue has not been observed in DSG 1.1 when loading the DSG
configuration file from the startup configuration, as during a reload.

Multicast Configuration Restrictions


As with earlier versions of DSG Issues 0.9 and 1.0, IP multicasting must be configured for correct
operation of A-DSG 1.2. Specifically, IP multicast routing must be set in global configuration. Also, IP
PIM must be configured on all bundle interfaces of cable interfaces that are to carry multicast traffic.
See the “Configuring the Default Multicast Quality of Service” section on page 7 and the “Configuring
IP Multicast Operations” section on page 18 for additional Multicast information and global
configurations supporting DSG.

Cisco CMTS Router Service Features Configuration Guide


3
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
Information About Advanced-Mode DSG Issue 1.2

NAT for DSG Unicast-only Mapping


A-DSG 1.2 supports multicast IP addressing. However, it also supports unicast IP destination addresses.
On the Cisco uBR7246VXR router, DSG 1.2 support is provided with the configuration of Network
Address Translation (NAT) on the router, to include these settings:
• WAN interface(s) are configured with the ip nat outside command.
• Cable interface(s) are configured with the ip nat inside command.
• For each mapping, additional configuration includes the source static multicast IP address and the
unicast IP address.
The unicast IP address is the unicast destination IP address of the DSG packets arriving at the Cisco
CMTS router. The multicast IP address is the new destination IP address that is configured to map to one
or a set of DSG tunnels.

PIM and SSM for Multicast


When using Source Specific Multicast (SSM) operation in conjunction with A-DSG 1.2, the following
system-wide configuration command must be specified:
• ip pim ssm
Refer to the “Configuring IP Multicast Operations” section on page 18.

Subinterfaces
A-DSG 1.2 supports subinterfaces on the Cisco CMTS router starting from Cisco IOS Release
12.2(33)SCB4.

Information About Advanced-Mode DSG Issue 1.2


A-DSG 1.2 offers substantial upgrades over A-DSG 1.1 and earlier basic DSG on the Cisco CMTS
router. A-DSG 1.2 offers these new or enhanced capabilities:
• A-DSG client and agent modes
• Advanced-mode MIBs supporting DSG 1.2, including the DOCS-DSG-IF-MIB
• Advanced-mode tunnels with increased security
• Cable interface bundling through virtual interface bundling
• Downstream Channel Descriptor
• IP multicast support
• Quality of Service (QoS)

DSG 1.2 Clients and Agents


A-DSG 1.2 supports the DSG client and agent functions outlined by the CableLabs™ DOCSIS Set-top
Gateway (DSG) Interface Specification, CM-SP-DSG-I05-050812.

Cisco CMTS Router Service Features Configuration Guide


4
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
Information About Advanced-Mode DSG Issue 1.2

FQDN Support
Starting with Cisco IOS Release 12.2(33)SCG, you can specify either a fully-qualified domain name
(FQDN) or IP address for A-DSG classifier multicast group and source addresses using the cable dsg cfr
command in global configuration mode. We recommend that you use an FQDN to avoid modification of
multicast group and source addresses when network changes are implemented.
This feature allows you to use a hostname (FQDN) in place of the source IP address using the
cable dsg cfr command. For example, you have two A-DSG tunnel servers, in two locations, sending
multicast traffic to the same multicast address. In this scenario, you can specify a hostname for the source
IP address and let the DNS server determine which source is sending the multicast traffic.
If you configure an A-DSG classifier with a hostname, the Cisco CMTS router immediately verifies if
the hostname can be resolved against an IP address using the local host cache. If not, the router does not
enable the classifier until the hostname is resolved. If the hostname cannot be resolved locally, the router
performs a DNS query to verify the DSG classifiers.
The FQDN format does not support static Internet Group Management Protocol (IGMP) join requests
initiated on the Cisco CMTS router. The IGMP static group IP address created automatically under a
bundle interface at the time of A-DSG configuration is not displayed in the
show running-config interface command output in Cisco IOS Release 12.2(33)SCG and later. To
display the A-DSG static groups configured under a bundle interface, use the
show cable dsg static-group bundle command in privileged EXEC mode in
Cisco IOS Release 12.2(33)SCG and later.

DSG Name Process and DNS Query


Every DNS record contains a time to live (TTL) value set by the server administrator, and this may vary
from seconds to weeks. The DSG name process supersedes the TTL value criterion to update A-DSG
classifiers on the Cisco CMTS router.
The DSG name process enables the Cisco CMTS router to query the DNS server for faster classifier
updates. To enable the Cisco CMTS router to perform a DNS query for an A-DSG classifier verification,
you must configure one or more DNS servers using the ip name-server command in global
configuration mode. You can also specify the DNS query interval using the
cable dsg name-update-interval command in global configuration mode.
During a Cisco IOS software reload or a route processor switchover, the router may fail to query the DNS
server if the interfaces are down, and the router may not wait for the interval specified using the
cable dsg name-update-interval command to perform a DNS query. In this case, for an unresolved
hostname, the router automatically performs a DNS query based on a system-defined (15 seconds)
interval to facilitate faster DSG classifier updates. You cannot change the system-defined interval.

A-DSG Forwarding on the Primary Channel


In Cisco IOS Release 12.2(33)SCF and earlier, DSG tunnels are configured globally and applied to all
MAC domain interfaces. This automatically creates DSG tunnels for all primary capable interfaces
associated with the MAC domain interfaces.
In Cisco IOS Releases earlier to 12.2(33)SCG, you cannot exclude A-DSG forwarding per primary
capable interface. However, you can disable A-DSG forwarding for the entire MAC domain by using the
no form of the cable dsg tg command.

Cisco CMTS Router Service Features Configuration Guide


5
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
Information About Advanced-Mode DSG Issue 1.2

Starting with Cisco IOS Release 12.2(33)SCG, you can disable A-DSG forwarding per primary capable
interface using the cable downstream dsg disable command in interface configuration mode. Primary
capable interfaces include modular, integrated cable interfaces, and Cisco uBR10-MC5X20 and
Cisco uBR-MC28U cable interfaces.
For example, assume the cable interface 7/1/1 has A-DSG enabled and has four modular channels
attached to it. However, you want A-DSG forwarding enabled only on two of these four modular
channels. You can exclude the channels of your choice using the cable downstream dsg disable
command. For details on how to disable modular channels, see the “Disabling A-DSG Forwarding on
the Primary Channel” section on page 28.

Note If A-DSG downstream forwarding is disabled on a primary capable interface, the router does not create
multicast service flows on the primary capable interface and stops sending Downstream Channel
Descriptor (DCD) messages.

DOCSIS 3.0 DSG MDF Support


Support for DOCSIS 3.0 DSG Multicast DSID Forwarding (MDF) is introduced in Cisco IOS Release
12.2(33)SCG using DSG DA-to-DSID Association Entry type, length, value (TLV 13) in the MAC
domain descriptor (MDD) message to communicate the association between a downstream service
identifier (DSID) and a group MAC address used for DSG tunnel traffic. This is automatically supported
on the Cisco CMTS router.
DOCSIS 2.0 hybrid CMs and DOCSIS 3.0 CMs use Dynamic Bonding Change (DBC) to get DSID
information from the Cisco CMTS router, whereas DOCSIS 2.0 DSG hybrid embedded CMs and
DOCSIS 3.0 DSG embedded CMs get DSID information from the Cisco CMTS router through MDD
messages.
To disable MDF capability on all DSG embedded cable modems, including DOCSIS 3.0 DSG and
DOCSIS 2.0 DSG hybrid modems, use the cable multicast mdf-disable command with the dsg
keyword in global configuration mode.

Source Specific Multicast Mapping


Source Specific Multicast (SSM) is a datagram delivery model that best supports one-to-many
applications, also known as broadcast applications. SSM is a core networking technology for the Cisco
implementation of IP multicast solutions targeted for audio and video broadcast application
environments.
The following two Cisco IOS components together support the implementation of SSM:
• Protocol Independent Multicast source-specific mode (PIM-SSM)
• Internet Group Management Protocol Version 3 (IGMPv3)
Starting with Cisco IOS Release 12.2(33)SCG, SSM mapping can be configured on Cisco CMTS
routers.
For details on how to configure SSM mapping on a Cisco CMTS router, see the Source Specific
Multicast (SSM) Mapping feature guide.

Cisco CMTS Router Service Features Configuration Guide


6
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

How to Configure Advanced-Mode DSG Issue 1.2


Advanced-mode DSG Issue 1.2 entails support for DSG tunnel configuration, to include global,
WAN-side, and interface-level settings in support of Multicast.
• Configuring the Default Multicast Quality of Service, page 7 (required)
• Configuring Global Tunnel Group Settings for Advanced-Mode DSG 1.2, page 8 (required)
• Adding DSG Tunnel Group to a Subinterface, page 11 (required)
• Configuring the DSG Client Settings for Advanced-Mode DSG 1.2, page 13 (required)
• Configuring Downstream DSG 1.2 Settings for Advanced-Mode DSG 1.2, page 16 (required)
• Configuring IP Multicast Operations, page 18 (required)
• Enabling DNS Query and DSG Name Process, page 20 (optional)
• Configuring NAT to Support Unicast Messaging, page 21 (optional)
• Configuring WAN Interfaces for Multicast Operations, page 23 (optional)
• Configuring a Standard IP Access List for Packet Filtering, page 24 (optional)
• Configuring a Standard IP Access List for Multicast Group Filtering, page 26 (optional)
• Disabling A-DSG Forwarding on the Primary Channel, page 28 (optional)

Configuring the Default Multicast Quality of Service


According to DOCSIS 3.0, you must configure the default multicast quality of service (MQoS) when
using the MQoS. This also applies to the DSG, which uses the MQoS by associating a service class name
with the tunnel.
If the default MQoS is not configured, the DSG tunnel service class configuration is rejected. Similarly,
if no DSG tunnel uses the MQoS, you are prompted to remove the default MQoS.
The CMTS selects the primary downstream channel to forward the multicast traffic when the default
MQoS is configured and there is no matching MQoS group configuration. Otherwise, the wideband
interface is used to forward the multicast traffic.

SUMMARY STEPS

1. enable
2. configure terminal
3. cable multicast group-qos default scn service-class-name aggregate
4. end

Cisco CMTS Router Service Features Configuration Guide


7
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

DETAILED STEPS

Command or Action Purpose


Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Step 2 configure terminal Enters global configuration mode.

Example:
Router# configure terminal
Router(config)#
Step 3 cable multicast group-qos default scn Configures a service class name for the QoS profile.
service-class-name aggregate
• scn service-class-name—Service class name
for the QoS profile.
Example:
Router(config)# cable multicast group-qos default
• aggregate—Specifies that service flows are
scn name1 aggregate grouped for sessions in the same MQoS group
Step 4 end Returns to privileged EXEC mode.

Example:
Router(config)# end

Note If you configure or remove the default MQoS while the CMTS is sending multicast traffic, duplicate
traffic is generated for approximately 3 minutes (or 3 times the query interval).

Configuring Global Tunnel Group Settings for Advanced-Mode DSG 1.2


This procedure configures global and interface-level commands on the Cisco CMTS router to enable
DSG tunnel groups. A DSG tunnel group is used to bundle some DSG channels together and associate
them to a MAC domain interface.

Global A-DSG 1.2 Tunnel Settings


This procedure sets and enables global configurations to support both A-DSG 1.2 clients and agents.
Additional procedures provide additional settings for these clients and agents.

Prerequisites
Starting with the Cisco IOS Release 12.2(33)SCC1, when DOCSIS Set-top Gateway (DSG) is
configured to have quality of service (QoS) for tunnel, ensure that the default multicast QoS (MQoS) is
also configured. For more information, see Configuring the Default Multicast Quality of Service, page 7.

Cisco CMTS Router Service Features Configuration Guide


8
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Restrictions
The DSG tunnel service class configuration is rejected, if default MQoS is not configured.

SUMMARY STEPS

1. enable
2. configure terminal
3. cable dsg tg group-id [channel channel-id | priority DSG-rule-priority] [enable | disable]
4. cable dsg tg group-id [channel channel-id [ucid ID1 | ID2 ID3 ID4]]
5. cable dsg tg group-id [channel channel-id [vendor-param vendor-group-id]]
6. cable dsg vendor-param group-id vendor vendor-id oui oui value value-in-TLV
7. cable dsg chan-list list-index index entry-index freq freq
8. cable dsg timer index [Tdsg1 Tdsg1] | [Tdsg2 Tdsg2] | [Tdsg3 Tdsg3] | [Tdsg4 Tdsg4]
9. end

DETAILED STEPS

Command or Action Purpose


Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Step 2 configure terminal Enters global configuration mode.

Example:
Router# configure terminal
Router(config)#
Step 3 cable dsg tg group-id [channel channel-id|priority Command allows the association of a group of
DSG-rule-priority] [enable|disable] tunnels to one or more downstream interfaces on the
Cisco CMTS.
Example: • tg—DSG tunnel group id
Router(config)# cable dsg tg 1 channel 1 priority 1
enable • channel—downstream channel index
• priority—DSG Rule priority
• enable—Enable tunnel group
• disable—Disable tunnel group
Step 4 cable dsg tg group-id [channel channel-id [ucid Sets the upstream channel or channels to which the
ID1]] DSG 1.2 tunnel applies.
• ucid—List of Upstream channel ID for which
Example: the rule applies
Router(config)# cable dsg tg 1 channel 1 ucid 1

Cisco CMTS Router Service Features Configuration Guide


9
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Command or Action Purpose


Step 5 cable dsg tg group-id [channel channel-id Sets the vendor-specific parameters for upstream
[vendor-param vendor-group-id]] DSG 1.2 channels.
• vendor-param—Vendor parameter index for
Example: the vendor specific parameters
Router(config)# cable dsg tg 1 channel 1
vendor-param 1
Step 6 cable dsg vendor-param group-id vendor vendor-index Configures vendor-specific parameters for A-DSG
oui oui value value-in-TLV 1.2. To remove this configuration from the Cisco
CMTS, use the no form of this command.
Example: • vendor-param—Sets the DSG vendor
Router(config)# cable dsg vendor-param 1 vendor 1 parameter group identifier.
oui ABCDEA value 0101AB
• vendor—DSG vendor parameters vendor index
setting.
• oui—DSG vendor parameters vendor OUI
setting. Includes the 0803oui tlv in the VSIF.
• value—DSG vendor parameters vendor value
setting.
Step 7 cable dsg chan-list list-index index entry-index Configures the A-DSG 1.2 downstream channel list.
freq freq The channel list is a list of DSG channels
(downstream frequencies) that set-top boxes can
Example: search to find the DSG tunnel appropriate for their
Router(config)# cable dsg chan-list 1 index 1 freq operation. To remove the A-DSG 1.2 channel list
47000000 from the Cisco CMTS, us the no form of this
command.
• list-index—an index used to indicate a group of
channels (downstream frequencies) to include
in the DCD messages for an interface.
• entry-index—DSG channel frequency entry
index.
• freq—Center frequency of the downstream
channel in Hz. This value must be a multiple of
62500 Hz.

Cisco CMTS Router Service Features Configuration Guide


10
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Command or Action Purpose


Step 8 cable dsg timer index [Tdsg1 Tdsg1] | [Tdsg2 Tdsg2] Configures the A-DSG 1.2 timer entry to be
| [Tdsg3 Tdsg3] | [Tdsg4 Tdsg4] associated to the downstream channel, and encoded
into the Downstream Channel Descriptor (DCD)
Example: message. To remove the cable DSG timer from the
Router(config)# cable dsg timer 1 Tdsg1 1 Tdsg2 2 Cisco CMTS, use the no form of this command.
Tdsg3 3 Tdsg4 4
• index—Alphanumeric index identifier
• Tdsg1 Tdsg1—DSG Initialization Timeout
(Tdsg1) setting
• Tdsg2 Tdsg2—DSG Operational Timeout
(Tdsg2) setting
• Tdsg3 Tdsg3—DSG Two-Way Retry Timer
(Tdsg3) setting
• Tdsg4 Tdsg4—DSG One-Way Retry Timer
(Tdsg4) setting
Step 9 end Returns to privileged EXEC mode.

Example:
Router(config)# end

Examples
The following example illustrates global upstream configurations implemented with the above
commands:
Router> enable
Router# configure terminal
Router(config)# cable dsg tg 1 channel 1 priority 1 enable
Router(config)# cable dsg tg 1 channel 1 ucid 1
Router(config)# cable dsg tg 1 channel 1 vendor-param 1
Router(config)# end
Router#

Troubleshooting Tips
Refer to debug and show commands in the “How to Monitor and Debug the Advanced-mode DOCSIS
Set-Top Gateway Feature” section on page 29.

Adding DSG Tunnel Group to a Subinterface


This procedure adds a DSG tunnel group to a subinterface using the cable dsg tg group-id command.
After adding the DSG tunnel-group to a subinterface, appropriate IP Internet Group Management
Protocol (IGMP) static joins are created and forwarding of DSG traffic begins, if the downstream DSG
is configured.

Note This feature is not supported on Cisco IOS Release 12.2(33)SCC.

Cisco CMTS Router Service Features Configuration Guide


11
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Prerequisites
Cisco IOS Release 12.2(33)SCB4 or Cisco IOS Release 12.2(33)SCC1 or future release versions must
be installed previously on the Cisco CMTS.
The downstream DSG should exist to create IGMP static joins.

Restrictions
You can associate a DSG tunnel group to only one subinterface within the same bundle interface.

SUMMARY STEPS

1. enable
2. configure terminal
3. interface bundle bundle-subif-number
4. cable dsg tg group-id
5. end

DETAILED STEPS

Command or Action Purpose


Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Step 2 configure terminal Enters global configuration mode.

Example:
Router# configure terminal
Router(config)#
Step 3 interface bundle bundle-subif-number Specifies the interface bundle and enters the
subinterface configuration mode.
Example: • bundle-subif-number—Interface bundle
Router(config)# interface bundle 11.2 number.
Router(config-subif)#
Step 4 cable dsg tg group-id Adds a DSG tunnel group to a subinterface.
• group-id—DSG tunnel group identifier.
Example:
Router(config-subif)# cable dsg tg 1
Step 5 end Returns to privileged EXEC mode.

Example:
Router(config-subif)# end

Cisco CMTS Router Service Features Configuration Guide


12
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Examples
The following example shows how to add a DSG tunnel group to a subinterface:
Router> enable
Router# configure terminal
Router(config)# interface bundle 11.2
Router(config-subif)# cable dsg tg 1
Router(config-subif)# end
Router#

Configuring the DSG Client Settings for Advanced-Mode DSG 1.2


After the global configurations and DSG client configurations are set for DSG 1.2 on the Cisco CMTS,
use the following procedure to continue DSG 1.2 client configurations.

Restrictions
The in-dcd ignore option is not supported by DSG-IF-MIBS specification.

SUMMARY STEPS

1. enable
2. configure terminal
3. cable dsg client-list client-list-id id-index id {application-id app-id | ca-system-id sys-id |
mac-addr mac-addr | broadcast [broadcast-id]}
4. cable dsg client-list client-list-id id-index id [vendor-param vendor-group-id]
5. cable dsg tunnel tunnel id mac_addr mac addr tg tunnel-group clients client-list-id [enable |
disable]
6. cable dsg cfr cfr index [dest-ip {ipaddr | hostname}] [tunnel tunnel index] [dest-port start end]
[priority priority] [src-ip {ipaddr | hostname} [src-prefix-len length]] [enable | disable] [in-dcd
{yes | no | ignore}]
7. end

DETAILED STEPS

Command or Action Purpose


Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Step 2 configure terminal Enters global configuration mode.

Example:
Router# configure terminal

Cisco CMTS Router Service Features Configuration Guide


13
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Command or Action Purpose


Step 3 cable dsg client-list client-list-id id-index Sets the DSG client parameters. This command is changed
id {application-id app-id | ca-system-id sys-id from earlier Cisco IOS Releases, and for DSG 1.2, this
| mac-addr mac-addr | broadcast [broadcast-id]}
command specifies the optional broadcast ID to client ID
broadcast type and vendor specific parameter index.
Example: • client-list client-list-id—Sets the DSG client list ID.
Router(config)# cable dsg client-list 1
id-index 1 mac-addr abcd.abcd.abcd • id-index id—Sets the index to use for DSG client ID
settings.
• application-id app-id—Sets the DSG client type
application ID.
• ca-system-id sys-id—Sets the DSG client type CA
system ID.
• mac-addr mac-addr—Sets the DSG client type MAC
address.
• broadcast broadcast-id—Sets the DSG client type
broadcast identifier.
Step 4 cable dsg client-list client-list-id id-index Sets vendor-specific parameters for the DSG client.
id [vendor-param vendor-group-id]
• client-list client-list-id—Sets the DSG client list ID.
• id-index id—Sets the DSG client ID.
Example:
Router(config-if)# cable dsg client-list 1 • vendor-param vendor-group-id—Sets the vendor
id-index 1 vendor-param 1 parameter index for the vendor-specific parameters,
and applied to the specified vendor group.
Step 5 cable dsg tunnel tunnel id mac_addr mac addr tg This command is changed to associate a tunnel group and
tunnel-group clients client-list-id [enable | client-list ID to a DSG tunnel. Also, an optional QoS
disable]
service class name can be associated to the tunnel.
• tunnel tunnel-id—Specifies the DSG tunnel to which
Example: this client setting applies.
Router(config)# cable dsg tunnel mac-addr
abcd.abcd.abcd tg 1 clients 1 enable • mac-addr mac addr—Sets the DSG client type MAC
address.
• tg tunnel-group—Sets the tunnel group associated with
the DSG tunnel.
• clients client-list-id—Sets the client list to which this
configuration applies.
• disable—Disables the DSG tunnel.
• enable—Enables the DSG tunnel.
Note To associate a cable service class with an A-DSG
tunnel on a Cisco CMTS router, use the cable dsg
tunnel srv-class command in global configuration
mode.

Cisco CMTS Router Service Features Configuration Guide


14
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Command or Action Purpose


Step 6 cable dsg cfr cfr index [dest-ip {ipaddr Specifies the DSG classifier index, with optional support
|hostname}][tunnel tunnel-index][dest-port for the DCD parameter, indicating whether or not to include
start end]| [priority priority][src-ip {ipaddr
|hostname}[src-prefix-len length]] [enable |
the classifier in the DCD message.
disable] [in-dcd {yes | no | ignore}] • cfr cfr index—Sets the classifier index with the cfr
index value.
Example: • dest-ip—(Optional) Sets the destination IP address.
Router(config)# cable dsg cfr 1 dest-ip This keyword is required for a new classifier, but
224.225.225.225 tunnel 1 dest-port 40 50 optional for an existing classifier.
priority 2 src-ip ciscovideo.com src-prefix-len
24 enable • ipaddr—Destination multicast group IP address.
• hostname—Fully-qualified domain name.
• dest-ports start end—(Optional) Sets the destination
TCP/UDP ports range.
• disable—(Optional) Disables the classifier.
• enable—(Optional) Enables the classifier.
• priority priority—(Optional) Sets the classifier
priority with the specified priority value.
• src-ip {ipaddr | hostname}—(Optional) Sets the source
IP address or FQDN.
• tunnel tunnel-index—(Optional) Sets the tunnel index
with the specified tunnel index value.
• in-dcd—(Optional) Specifies whether or not the
classifier is included in the DCD message.
Note The ignore option was added to the in-dcd keyword
from Cisco IOS Release 12.2(33)SCD5 onwards.
When you use the ignore option, the DSG classifier
is not included in the DCD message.
Step 7 end Returns to privileged EXEC mode.

Example:
Router(config)# end
Router#

Examples
The following example illustrates global configuration of DSG 1.2 on the Cisco CMTS, supporting the
specified settings shown. Global configuration may vary, but this example is representative of a typical
configuration:
Router(config)# cable dsg vendor-param 1 vendor 1 oui 000001 value 010101
Router(config)# cable dsg client-list 1 id-index 1 mac-addr abcd.abcd.abcd
Router(config)# cable dsg tg 1 channel 1
Router(config)# cable dsg tunnel 1 mac-addr 0abc.0abc.0abc tg 1 clients 1
Router(config)# cable dsg cfr 1 dest-ip 224.225.225.225 tunnel 1 dest-port 40 50 priority
2 src-ip 1.11.37.0 src-prefix-len 24 in-dcd ignore
Router(config)# cable dsg timer 1 Tdsg1 4 Tdsg2 600 Tdsg3 300 Tdsg4 1800
Router(config)# cable dsg chan-list 1 index 1 freq 471000000

Cisco CMTS Router Service Features Configuration Guide


15
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Troubleshooting Tips
Refer to debug and show commands in the “How to Monitor and Debug the Advanced-mode DOCSIS
Set-Top Gateway Feature” section on page 29.

Configuring Downstream DSG 1.2 Settings for Advanced-Mode DSG 1.2


When the global and client configurations are set for DSG 1.2 on the Cisco CMTS, use the following
procedure to continue with DSG 1.2 downstream configurations.

SUMMARY STEPS

1. enable
2. configure terminal
3. interface cable {slot/port | slot/subslot/port}
4. cable downstream dsg tg group-id [channel channel-id]
5. cable downstream dsg chan-list list-index
6. cable downstream dsg timer timer-index
7. cable downstream dsg vendor-param vsif-grp-id
8. cable downstream dsg [ dcd-enable | dcd-disable ]
9. end

DETAILED STEPS

Command or Action Purpose


Step 1 enable Enables privileged EXEC mode.
• Enter your password if prompted.
Example:
Router> enable
Step 2 configure terminal Enters global configuration mode.

Example:
Router# configure terminal
Step 3 interface cable {slot/port | slot/subslot/port} Enters interface configuration mode.
• On the Cisco uBR7200 series router, slot can range
Example: from 3 to 6, and port can be 0 or 1, depending on the
Router(config)# interface cable 8/1/1 cable interface.
• On the Cisco uBR10012 router, the valid values are:
– slot—5 to 8
– subslot—0 or 1
– port—0 to 4 (depending on the cable interface)

Cisco CMTS Router Service Features Configuration Guide


16
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Command or Action Purpose


Step 4 cable downstream dsg tg group-id [channel Associates the DSG tunnel group to the downstream
channel-id] interface. To remove this setting, use the no form of this
command.
Example: • tg—DSG tunnel group ID.
Router(config-if)# cable downstream dsg tg 1
channel 1 • channel channel-id—(Optional) Downstream channel
index.
Step 5 cable downstream dsg chan-list list-index Associates the A-DSG channel list entry to a downstream
channel, to be included in the DCD message. To remove this
setting, use the no form of this command.
Example:
Router(config-if)# cable downstream dsg • chan-list—Sets the downstream A-DSG 1.1 channel
chan-list 2 list.
• list-index—Integer is between 1 and 65535.
Step 6 cable downstream dsg timer timer-index Associates the DSG timer entry to a downstream channel, to
be included in the DCD message. To remove this setting,
use the no form of this command.
Example:
Router(config-if)# cable downstream dsg timer 3 • timer-index—Integer is between 1 and 65535.
Step 7 cable downstream dsg vendor-param vsif-grp-id Associates A-DSG vendor parameters to a downstream to
be included in the DCD message. To remove this
configuration from the Cisco CMTS, use the no form of this
Example:
Router(config-if)# cable downstream dsg
command.
vendor-param 2 • vsif-grp-id—Value identifies vendor-specific
parameters by the specified ID.
Step 8 cable downstream dsg [dcd-enable | dcd-disable] Enables DCD messages to be sent on a downstream
channel. This command is used when there are no enabled
rules or tunnels for A-DSG currently on the Cisco CMTS.
Example:
Router(config-if)# cable downstream dsg
To disable DCD messages, use the disable form of this
dcd-enable command.
Step 9 end Returns to privileged EXEC mode.

Example:
Router(config-if)# end

Cisco CMTS Router Service Features Configuration Guide


17
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Examples
The following example illustrates downstream settings configured for DSG 1.2 on the Cisco CMTS:

Downstream 1
Router# configure terminal
Router(config)# interface cable 7/1/1
Router(config-if)# cable downstream dsg chan-list 1
Router(config-if)# cable downstream dsg timer 1
Router(config-if)# cable downstream dsg tg 1 channel 1
Router(config-if)# end

Downstream 2
The setting given below uses the same DSG tunnel-group as that of downstream 1.
Router# configure terminal
Router(config)# interface cable 8/1/1
Router(config-if)# cable downstream dsg chan-list 1
Router(config-if)# cable downstream dsg timer 1
Router(config-if)# cable downstream dsg tg 1 channel 2
Router(config-if)# cable downstream dsg vendor-param 1
Router(config-if)# Ctrl^Z

Configuring IP Multicast Operations


This section describes how to configure the operation of IP multicast transmissions on the cable and
WAN interfaces on the Cisco CMTS. You should perform this configuration on each cable interface
being used for DSG traffic and for each WAN interface that is connected to a network controller or
Conditional Access (CA) server that is forwarding IP multicast traffic.

SUMMARY STEPS

1. configure terminal
2. ip multicast-routing
3. ip pim ssm {default | range {access-list | word}}
4. ip cef distributed
5. interface bundle bundle-number
6. ip pim {dense-mode | spasrse-mode | sparse-dense-mode}
7. end

Cisco CMTS Router Service Features Configuration Guide


18
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

DETAILED STEPS

Command or Action Purpose


Step 1 configure terminal Enters global configuration mode.

Example:
Router# configure terminal
Step 2 ip multicast-routing Enables multicast routing on the router.

Example:
Router(config)# ip multicast-routing
Step 3 ip pim ssm {default | range {access-list | Defines the Source Specific Multicast (SSM) range of IP
word}} multicast addresses. To disable the SSM range, use the no
form of this command.
Example: • vrf— (Optional) Supports the multicast Virtual Private
Router(config)# ip pim ssm range 4 Network (VPN) routing and forwarding (VRF)
instance.
• vrf-name—(Optional) Name assigned to the VRF.
• default—Defines the SSM range access list to 232/8.
• range access-list—Specifies the standard IP access list
number. The valid range is from 1 to 99.
• word—Standard IP access list name defining the SSM
range.
Note When an SSM range of IP multicast addresses is
defined by the ip pim ssm command, no Multicast
Source Discovery Protocol (MSDP) Source-Active
(SA) messages will be accepted or originated in the
SSM range.
Step 4 ip cef distributed Enables Cisco Express Forwarding (CEF) on the route
processor card. To disable CEF, use the no form of this
command.
Example:
Router(config)# ip cef distributed For additional information about the ip cef command, refer
to the following document on Cisco.com:
• Cisco IOS Switching Services Command Reference,
Release 12.3
http://www.cisco.com/en/US/docs/ios/12_3/switch/co
mmand/reference/swtch_r.html
Step 5 interface bundle bundle-number Enters interface configuration mode for each interface
bundle being used for DSG traffic.
Example:
Router(config)# interface bundle 10

Cisco CMTS Router Service Features Configuration Guide


19
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Command or Action Purpose


Step 6 ip pim {dense-mode | sparse-mode | Enables Protocol Independent Multicast (PIM) on the cable
sparse-dense-mode} interface, which is required to use the DSG feature:
• dense-mode—Enables dense mode of operation.
Example:
Router(config-if)# ip pim dense-mode
• sparse-mode—Enables sparse mode of operation.
• sparse-dense-mode—The interface is treated in either
sparse mode, sparse-dense mode, or dense mode of
operation, depending on the mode in which the
multicast group operates.
Note You must configure this command on each interface
that forwards multicast traffic.
Note Repeat Step 5 and Step 6 for each cable interface that is being used for DSG traffic. Also repeat these steps
on each W AN interface that is forwarding IP multicast traffic from the DSG network controllers and
Conditional Access (CA) servers.
Step 7 end Exits interface configuration mode and returns to privileged
EXEC mode.
Example:
Router(config-if)# end

Enabling DNS Query and DSG Name Process


The DSG name process enables the Cisco CMTS router to query the DNS server for faster classifier
updates.

Prerequisites
Ensure that the IP DNS-based hostname-to-address translation is configured on the Cisco CMTS router
using the ip domain-lookup command in global configuration mode. This is configured by default, and
the status is not displayed in the running configuration.

SUMMARY STEPS

1. configure terminal
2. ip domain-name name
3. ip name-server server-address [multiple-server-addresses]
4. cable dsg name-update-interval minutes
5. end

Cisco CMTS Router Service Features Configuration Guide


20
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

DETAILED STEPS

Command or Action Purpose


Step 1 configure terminal Enters global configuration mode.

Example:
Router# configure terminal
Step 2 ip domain-name name Sets the IP domain name that the Cisco IOS software uses
to complete unqualified host names.
Example: • name—Default domain name.
Router(config)# ip domain-name cisco.com
Step 3 ip name-server server-address Sets the server IP address.
[multiple-server-addresses]
• server-address— IP address of the server.
• multiple-server-addresses—(Optional) IP address of
Example:
Router(config)# ip name-server 131.108.1.111
multiple servers. You can specify a maximum of six
server addresses.
Step 4 cable dsg name-update-interval minutes Sets the interval to check the DNS server for any FQDN
classifier changes.
Example: • minutes—Interval in minutes. The valid range is from
Router(config)# cable dsg name-update-interval 1 to 60. The default value is 5.
10
Step 5 end Returns to privileged EXEC mode.

Example:
Router(config)# end

Configuring NAT to Support Unicast Messaging


This section describes how to configure a Cisco CMTS router for Network Address Translation (NAT)
to enable the use of IP unicast addresses for DSG messaging. This allows the Cisco CMTS router to
translate incoming IP unicast addresses into the appropriate IP multicast address for the DSG traffic.
For the Cisco uBR10012 router, A-DSG 1.2 can use an external router that is close to the Cisco CMTS
to support unicast messaging. In this case, the nearby router must support NAT, and then send the
address-translated multicast IP packets to the Cisco CMTS.

Tip This procedure should be performed after the cable interface has already been configured for DSG
operations, as described in the “Configuration Examples for Advanced-Mode DSG” section on page 41.

Note The Cisco CMTS router supports NAT only when it is running an “IP Plus” (-i-) Cisco IOS software
image. Refer to the release notes for your Cisco IOS release for complete image availability and
requirements.

Cisco CMTS Router Service Features Configuration Guide


21
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

SUMMARY STEPS

1. configure terminal
2. interface wan-interface
3. ip nat outside
4. interface bundle bundle-number
5. ip address ip-address mask secondary
6. ip nat inside
7. exit
8. ip nat inside source static ip-multicast-address cable-ip-address
9. end

DETAILED STEPS

Command or Action Purpose


Step 1 configure terminal Enters global configuration mode.

Example:
Router# configure terminal
Step 2 interface wan-interface Enters interface configuration mode for the specified WAN
interface.
Example:
Router(config)# interface FastEthernet0/0
Step 3 ip nat outside Configures the WAN interface as the “outside” (public)
NAT interface.
Example:
Router(config-if)# ip nat outside
Step 4 interface bundle bundle-number Enters interface configuration mode for the specified
interface bundle.
Example: Note This interface bundle should have previously been
Router(config-if)# interface bundle 10 configured for DSG operations.
Step 5 ip address ip-address mask secondary Configures the cable interface with an IP address and subnet
that should match the unicast address being used for DSG
traffic. This IP address and its subnet must not be used by
Example:
Router(config-if)# ip address 192.168.18.1
any other cable interfaces, cable modems, or any other types
255.255.255.0 secondary of traffic in the cable network.
Step 6 ip nat inside Configures the cable interface as the “inside” (private) NAT
interface.
Example:
Router(config-if)# ip nat inside
Step 7 exit Exits interface configuration mode and returns to global
configuration mode.
Example:
Router(config-if)# exit

Cisco CMTS Router Service Features Configuration Guide


22
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Command or Action Purpose


Step 8 ip nat inside source static Maps the unicast IP address assigned to the cable interface
ip-multicast-address cable-ip-address to the multicast address that should be used for the DSG
traffic.
Example: • ip-multicast-address—Address that should match the
Router(config)# ip nat inside source static multicast address that was used when enabling DSG on
224.3.2.1 192.168.18.2
the cable interface.
• cable-ip-address—Address that should match the IP
address of the incoming unicast packet.
Note Repeat Step 2 and Step 8 for each cable interface to be configured for DSG unicast traffic.
Step 9 end Exits global configuration mode and returns to privileged
EXEC mode.
Example:
Router(config)# end

Configuring WAN Interfaces for Multicast Operations


In addition to basic WAN interface configuration on the Cisco CMTS, described in other documents, the
following WAN interface commands should be configured on the Cisco CMTS to support IP multicast
operations with A-DSG 1.2, as required.
• ip pim
• ip pim ssm
• ip cef
These commands are described in the “Configuring IP Multicast Operations” section on page 18, and in
the following documents on Cisco.com.
For additional information about the ip pim command, refer to the following document on Cisco.com:
• Cisco IOS IP Command Reference, Volume 3 of 4: Multicast, Release 12.3
http://www.cisco.com/en/US/docs/ios/12_3/ipmulti/command/reference/iprmc_r.html
For additional information about the ip pim ssm command, refer to the following document on
Cisco.com:
• Cisco IOS IP Command Reference, Volume 3 of 4: Multicast, Release 12.3 T
http://www.cisco.com/en/US/docs/ios/12_3t/ip_mcast/command/reference/ip3_i2gt.html
For additional information about the ip cef command, refer to the following document on Cisco.com:
• Cisco IOS Switching Services Command Reference, Release 12.3
http://www.cisco.com/en/US/docs/ios/12_3/switch/command/reference/swtch_r.html

Cisco CMTS Router Service Features Configuration Guide


23
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Configuring a Standard IP Access List for Packet Filtering


This section describes how to configure a standard IP access list so that only authorized traffic is allowed
on the cable interface.

Tip This procedure assumes a basic knowledge of how access lists use an IP address and bitmask to
determine the range of IP addresses that are allowed access. For full details on configuring access lists,
see the documents listed in the “Additional References” section on page 45.

SUMMARY STEPS

1. configure terminal
2. access-list access-list permit group-ip-address [mask]
3. access-list access-list deny group-ip-address [mask]
4. access-list access-list deny any
5. interface bundle bundle-number
6. ip access-group access-list
7. end

DETAILED STEPS

Command or Action Purpose


Step 1 configure terminal Enters global configuration mode.

Example:
Router# configure terminal
Step 2 access-list access-list permit group-ip-address Creates an access list specifying that permits access to the
[mask] specific multicast address that matches the specified
group-ip-address and mask.
Example: • access-list—Number or name of a standard IP access
Router(config)# access-list 90 permit 228.1.1.1 list. The number can range from 1 to 99 with no default.
• group-ip-address—IP address to be used as a base for
this access list. It should be based on the group IP
address used for DSG tunnels of the interface.
• mask—(Optional) Bitmask that determines which
addresses in the group-ip-address will be allowed
access. The default is 255.255.255.255.

Cisco CMTS Router Service Features Configuration Guide


24
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Command or Action Purpose


Step 3 access-list access-list deny group-ip-address Configures the access list that denies access to any multicast
[mask] address that matches the specified group-ip-address and
mask.
Example: • access-list—Number or name of a standard IP access
Router(config)# access-list 90 deny 224.0.0.0 list. The number can range from 1 to 99 with no default.
15.255.255.255
• group-ip-address—IP address to be used as a base for
this access list. It should be based on the group IP
address used for the interface’s DSG tunnels.
• mask—(Optional) Bitmask that determines which
addresses in the group-ip-address will be allowed
access. The default is 255.255.255.255.
Step 4 access-list access-list deny any Configures the access list so that it denies access to any IP
addresses other than the ones previously configured.
Example:
Router(config)# access-list 90 deny any
Step 5 interface bundle bundle-number Enters interface configuration mode for the specified
interface bundle.
Example:
Router(config)# interface bundle 10
Step 6 ip access-group access-list (Optional, but recommended) Configures the interface with
the access list, so that packets are filtered by the list before
being accepted on the interface.
Example:
Router(config-if)# ip access-group 90 • access-list—Number or name of a standard IP access
list. The number can range from 1 to 99 and should be
the same list created in Step 3.
Note Standard Access lists only allow one address to be
specified in the earlier step. If you apply an
outbound access-list with only the multicast address
of the tunnel denied, then the DSG traffic is not
allowed to pass.

Note On the Cisco uBR10012 router, inbound access lists


on the cable interface do not apply to multicast
traffic, so they do not apply here. As a result, the
Cisco uBR10012 requires that you use extended
access lists that are blocked in the outbound
direction for packets originating from the cable
modem or CPE device on the network, and destined
to the multicast group. The multicast group contains
the classifiers associated with A-DSG 1.1 rules
enabled on the interface.
Step 7 end Exits interface configuration mode and returns to Privileged
EXEC mode.
Example:
Router(config-if)# end

Cisco CMTS Router Service Features Configuration Guide


25
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Configuring a Standard IP Access List for Multicast Group Filtering


This section describes how to configure a standard IP access list so that non-DOCSIS devices, such as
DSG set-top boxes, can access only the authorized multicast group addresses and DSG tunnels.

Tip This procedure assumes a basic knowledge of how access lists use an IP address and bitmask to
determine the range of IP addresses that are allowed access. For full details on configuring access lists,
see the documents listed in the “Additional References” section on page 45.

SUMMARY STEPS

1. configure terminal
2. access-list access-list permit group-ip-address [mask]
3. access-list access-list deny group-ip-address [mask]
4. access-list access-list deny any
5. interface cable interface
6. ip igmp access-group access-list [version]
7. end

DETAILED STEPS

Command or Action Purpose


Step 1 configure terminal Enters global configuration mode.

Example:
Router# configure terminal
Step 2 access-list access-list permit group-ip-address Creates an access list specifying that permits access to the
[mask] specific multicast address that matches the specified
group-ip-address and mask.
Example: • access-list —Number or name of a standard IP access
Router(config)# access-list 90 permit 228.1.1.1 list. The number can range from 1 to 99 with no default.
• group-ip-address—IP address to be used as a base for
this access list. It should be based on the group IP
address used for the interface’s DSG tunnels.
• mask—(Optional) Bitmask that determines which
addresses in the group-ip-address will be allowed
access. The default is 255.255.255.255.

Cisco CMTS Router Service Features Configuration Guide


26
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Command or Action Purpose


Step 3 access-list access-list deny group-ip-address Configures the access list that denies access to any multicast
[mask] address that matches the specified group-ip-address and
mask.
Example: • access-list—Number or name of a standard IP access
Router(config)# access-list 90 deny 224.0.0.0 list. The number can range from 1 to 99 with no default.
15.255.255.255
• group-ip-address—IP address to be used as a base for
this access list. It should be based on the group IP
address used for the interface’s DSG tunnels.
• mask—(Optional) Bitmask that determines which
addresses in the group-ip-address will be allowed
access. The default is 255.255.255.255.
Step 4 access-list access-list deny any Configures the access list so that it denies access to any IP
addresses other than the ones previously configured.
Example:
Router(config)# access-list 90 deny any
Step 5 interface cable interface Enters interface configuration mode for the specified cable
interface.
Example:
Router(config)# interface cable 3/0
Step 6 ip igmp access-group access-list [version] (Optional, but recommended) Configures the interface to
accept traffic only from the associated access list, so that
only authorized devices are allowed to access the DSG
Example:
Router(config-if)# ip igmp access-group 90
tunnels.
• access-list—Number or name of a standard IP access
list. The number can range from 1 to 99 and should be
the same list created in Step 3.
• version—(Optional) Specifies the IGMP version. The
default is 2.
Step 7 end Exits interface configuration mode and returns to privileged
EXEC mode.
Example:
Router(config-if)# end

Cisco CMTS Router Service Features Configuration Guide


27
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Configure Advanced-Mode DSG Issue 1.2

Disabling A-DSG Forwarding on the Primary Channel


You can disable A-DSG forwarding per primary capable interface.

SUMMARY STEPS

1. configure terminal
2. interface modular-cable slot/subslot/port: interface-number
3. cable downstream dsg disable
4. end

DETAILED STEPS

Command or Action Purpose


Step 1 configure terminal Enters global configuration mode.

Example:
Router# configure terminal
Step 2 interface modular-cable slot/subslot/port: Specifies the modular cable interface and enters cable
interface-number interface configuration mode. Variables for this command
may vary depending on the Cisco CMTS router and the
Example: Cisco IOS software release. For details, see the Cisco IOS
Router(config)# interface modular-cable 1/0/0:0 CMTS Cable Command Reference.
• slot—Slot where a SPA interface processor (SIP) or a
line card resides.
• subslot—Secondary slot for a shared port adapter
(SPA) or a line card.
• port—Downstream port or the MAC domain index.
• interface-number—Modular cable interface number.
Step 3 cable downstream dsg disable Disables A-DSG forwarding and DCD messages on the
primary capable interface.
Example:
Router(config-if)# cable downstream dsg disable
Step 4 end Returns to privileged EXEC mode.

Example:
Router(config-if)# end

Cisco CMTS Router Service Features Configuration Guide


28
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Monitor and Debug the Advanced-mode DOCSIS Set-Top Gateway Feature

How to Monitor and Debug the Advanced-mode DOCSIS Set-Top


Gateway Feature
This section describes the following commands that you can use to monitor and display information
about the Advanced-mode DOCSIS Set-Top Gateway feature:
• Displaying Global Configurations for Advanced-Mode DSG 1.2, page 29
• Displaying Interface-level Configurations for Advanced-Mode DSG 1.2, page 38
• Debugging Advanced-Mode DSG

Displaying Global Configurations for Advanced-Mode DSG 1.2


The following commands display globally-configured or interface-level DSG settings, status, statistics,
and multiple types of DSG 1.2 tunnel information.
• show cable dsg cfr
• show cable dsg host
• show cable dsg tunnel
• show cable dsg tunnel ID
• show cable dsg tunnel ID statistics
• show cable dsg tg
• show running-config interface
• show cable dsg static-group bundle

Cisco CMTS Router Service Features Configuration Guide


29
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Monitor and Debug the Advanced-mode DOCSIS Set-Top Gateway Feature

show cable dsg cfr


To verify all DSG classifier details, such as the classifier state, source, and destination IP addresses, use
the show cable dsg cfr command as shown in the following example:
Router# show cable dsg cfr

cfr id state resolved applied conflict dest-ip src-ip


-------------------------------------- ----------------- -----------------
1000 en yes yes no 232.10.10.0 dsg-server-a
(40.0.0.30)
1010 en yes yes no 232.10.10.10 dsg-server-b
(40.0.0.40)
2000 en yes yes no 232.10.11.0 dsg-server-c
(40.0.0.50)
2010 en no no no 232.10.11.10 non-exist-hostnam
(----)
3000 en yes yes no 239.10.11.11 0.0.0.0

To verify details of a particular DSG classifier, use the show cable dsg cfr command as shown in the
following example:
Router# show cable dsg cfr 1010

cfr id state resolved applied conflict dest-ip src-ip


-------------------------------------- ----------------- ---------------
1010 en yes yes no 232.10.10.10 dsg-server-b
(40.0.0.40)

To verify the detailed output for all DSG classifiers, use the show cable dsg cfr command as shown in
the following example:
Router# show cable dsg cfr verbose

Cfr Id : 1000
State : enable
Resolved : yes
Applied : yes
Conflict : no
Conflict Cfr Id : --
Error Code : 0(DSG_CFR_ERR_NONE)
Tunnel Id : 1000
Dest Hostname : ----
Dest Hostname IP : ----
Dest IP : 232.10.10.0
Src Hostname : dsg-server-a
Src Hostname IP : 40.0.0.30
Src IP : 40.0.0.30
Src Prefix Length : 32
Dest Port Start : 2000
Dest Port End : 13821
Priority : 1
In DCD : yes
Forwarded : 0
Received : 0

Cfr Id : 1010
State : enable
Resolved : yes
Applied : yes
Conflict : no
Conflict Cfr Id : --
Error Code : 0(DSG_CFR_ERR_NONE)

Cisco CMTS Router Service Features Configuration Guide


30
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Monitor and Debug the Advanced-mode DOCSIS Set-Top Gateway Feature

Tunnel Id : 1010
Dest Hostname : ----
Dest Hostname IP : ----
Dest IP : 232.10.10.10
Src Hostname : dsg-server-b
Src Hostname IP : 40.0.0.40
Src IP : 40.0.0.40
Src Prefix Length : 32
Dest Port Start : 2000
Dest Port End : 13821
Priority : 1
In DCD : yes
Forwarded : 0
Received : 0

Cfr Id : 2000
State : enable
Resolved : yes
Applied : yes
Conflict : no
Conflict Cfr Id : --
Error Code : 0(DSG_CFR_ERR_NONE)
Tunnel Id : 2000
Dest Hostname : ----
Dest Hostname IP : ----
Dest IP : 232.10.11.0
Src Hostname : dsg-server-c
Src Hostname IP : 40.0.0.50
Src IP : 40.0.0.50
Src Prefix Length : 32
Dest Port Start : 13822
Dest Port End : 13822
Priority : 1
In DCD : yes
Forwarded : 0
Received : 0

Cfr Id : 2010
State : enable
Resolved : no
Applied : no
Conflict : no
Conflict Cfr Id : --
Error Code : 0(DSG_CFR_ERR_NONE)
Tunnel Id : 2010
Dest Hostname : ----
Dest Hostname IP : ----
Dest IP : 232.10.11.10
Src Hostname : non-exist-hostname
Src Hostname IP : ----
Src IP : 0.0.0.0
Src Prefix Length : 32
Dest Port Start : 2000
Dest Port End : 13821
Priority : 1
In DCD : yes
Forwarded : 0
Received : 0

Cfr Id : 3000
State : enable
Resolved : yes
Applied : yes
Conflict : no

Cisco CMTS Router Service Features Configuration Guide


31
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Monitor and Debug the Advanced-mode DOCSIS Set-Top Gateway Feature

Conflict Cfr Id : --
Error Code : 0(DSG_CFR_ERR_NONE)
Tunnel Id : 3000
Dest Hostname : ----
Dest Hostname IP : ----
Dest IP : 239.10.11.11
Src Hostname : ----
Src Hostname IP : ----
Src IP : 0.0.0.0
Src Prefix Length : 32
Dest Port Start : 2000
Dest Port End : 13821
Priority : 1
In DCD : yes
Forwarded : 0
Received : 0

To verify the detailed output for a single DSG classifier, use the show cable dsg cfr command as shown
in the following example:
Router# show cable dsg cfr 1010 verbose

Cfr Id : 1010
State : enable
Resolved : yes
Applied : yes
Conflict : no
Conflict Cfr Id : --
Error Code : 0(DSG_CFR_ERR_NONE)
Tunnel Id : 1010
Dest Hostname : ----
Dest Hostname IP : ----
Dest IP : 232.10.10.10
Src Hostname : dsg-server-b
Src Hostname IP : 40.0.0.40
Src IP : 40.0.0.40
Src Prefix Length : 32
Dest Port Start : 2000
Dest Port End : 13821
Priority : 1
In DCD : yes
Forwarded : 0
Received : 0

show cable dsg host


To verify the mapping of the DSG hostnames and IP addresses on a Cisco CMTS router, use the
show cable dsg host command as shown in the following example:

Router# show cable dsg host

Host IP Address Reference Last Update Time

dsgserver1 232.1.1.10 2 21:41 08/01/2011


dsgserver2 234.3.2.1 1 21:41 08/01/2011
dsgserver3 ---- 1 never
dsgserver4 ---- 1 never
dsgserver5 ---- 1 never
dsgserver6 235.5.5.5 1 21:41 08/01/2011
dsgserver7 235.0.0.2 1 21:41 08/01/2011

Cisco CMTS Router Service Features Configuration Guide


32
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Monitor and Debug the Advanced-mode DOCSIS Set-Top Gateway Feature

To verify the verbose output of the mapping of the DSG hostnames and IP addresses on a Cisco CMTS
router, use the show cable dsg host command as shown in the following example:
Router# show cable dsg host verbose

Host IP Address Reference Last Update Time

dsgserver1 232.1.1.10 2 21:41 08/01/2011


Cfrs:
cable dsg cfr 2 dest-ip 232.1.1.125 tunnel 1 priority 0 src-ip a.b.c.d d...
cable dsg cfr 3 dest-ip 232.1.1.125 tunnel 1 priority 10 src-ip a.b.c.d ...

dsgserver2 234.3.2.1 1 21:41 08/01/2011


Cfrs:
cable dsg cfr 4 dest-ip aaabbccc priority 0 src-ip cccdddeee disable

dsgserver3 ---- 1 never


Cfrs:
cable dsg cfr 4 dest-ip aaabbccc priority 0 src-ip cccdddeee disable

dsgserver4 235.0.0.2 1 21:41 08/01/2011


Cfrs:
cable dsg cfr 24 dest-ip g2 priority 0 disable

dsgserver5 235.0.0.3 1 21:41 08/01/2011


Cfrs:
cable dsg cfr 30 dest-ip g3 tunnel 1 priority 0 disable

show cable dsg tunnel


To display tunnel MAC address, state, tunnel group id, classifiers associated to tunnel and its state, use
the show cable dsg tunnel command in privileged EXEC mode. This command also displays the number
of interfaces to which a tunnel is associated, the clients associated, and the QoS service class name for
all the configured tunnels.
The following example illustrates this command:
Router# show cable dsg tunnel

tunnel TG cfr tunnel rule client service


id state mac-addr id id state I/F id state listId class
1 en 0100.5e01.0001 1 1 en C5/0 1 en 1 DSG-Rate1
6 en
7 en
8 en
2 en 0100.5e01.0002 1 2 enC5/0 2 en 2
3 en 0100.5e01.0003 1 3 enC5/0 3 en 3
4 en 0002.0002.0001 2 4 enC5/0 4 en 1
C5/1 1 en 1
5 en 0002.0002.0002 2 5 en C5/0 5 en 2 DSG-Rate2
C5/1 2 en 2
6 en 0002.0002.0003 2 9 en C5/0 6 en 21
C5/1 3 en 21

Cisco CMTS Router Service Features Configuration Guide


33
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Monitor and Debug the Advanced-mode DOCSIS Set-Top Gateway Feature

show cable dsg tunnel ID


To display information for a given DSG tunnel, use the show cable dsg tunnel command, specifying the
tunnel for which to display information.
show cable dsg tunnel tunnel-id [cfr | clients | interfaces | statistics | verbose]
• cfr—Shows DSG tunnel classifiers.
• clients—Shows DSG tunnel clients.
• interfaces—Shows DSG tunnel interfaces.
• statistics—Shows DSG tunnel statistics.
• verbose—Shows DSG tunnel detail information.
The below example illustrates this command for DSG Tunnel 1:
Router# show cable dsg tunnel 1

tunnel TG cfr tunnel rule client service


id state mac-addr id id state I/F id state listId class
1 en 0100.5e01.0001 1 1 en C5/0 1 en 1 DSG-Rate1
6 en
7 en
8 en

The below example shows detailed information of all the classifiers associated to the specified tunnel.
Router# show cable dsg tunnel 1 cfr
tunnel cfr cfr cfr destination ip source ip srcPre d_port d_port
id id state pri address address length start end
1 1 en 0 230.1.0.1 0.0.0.0 32 0 65535
6 en 0 231.1.1.6 0.0.0.0 32 0 65535
7 en 0 231.1.1.7 0.0.0.0 32 0 65535
8 en 0 231.1.1.8 0.0.0.0 32 0 65535

The below example illustrates detailed information about all the clients associated to the specified
tunnel.
Router# show cable dsg tunnel 1 clients

tunnel client client client client vendor


id listId id id type address group
1 1 1 MAC Addr 0100.5e00.0001
2 Application ID 0x0951
3 Broadcast Unspecified
4 Broadcast 4

The below example illustrates all DSG interfaces and rules associated to the specified tunnel.
Router# show cable dsg tunnel 1 interfaces

tunnel downstream rule


id interface id
4 Cable5/0 4
Cable5/1 1

Cisco CMTS Router Service Features Configuration Guide


34
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Monitor and Debug the Advanced-mode DOCSIS Set-Top Gateway Feature

show cable dsg tunnel ID statistics


The below example illustrates packet statistics information about the specified tunnel.
Router# show cable dsg tunnel 1 statistics

tunnel cfr cfr destination ip source ip total total


id id state address address forwarded received
1 1 en 230.1.0.1 0.0.0.0 0 0
6 en 231.1.1.6 0.0.0.0 0 0
7 en 231.1.1.7 0.0.0.0 0 0
8 en 231.1.1.8 0.0.0.0 0 0

The below example illustrates all detailed information about the specified tunnel.
Router# show cable dsg tunnel 1 verbose

Tunnel ID : 1
State : enable
MAC Addr : 0100.5e01.0001

TG Id : 1

Cfr Id : 1
State : enable
Priority : 0
Dest IP : 230.1.0.1
Src IP : 0.0.0.0
Src Prefix Length : 32
Dest Port Start : 0
Dest Port End : 65535
Forwarded : 0
Received : 0

Cfr Id : 6
State : enable
Priority : 0
Dest IP : 231.1.1.6
Src IP : 0.0.0.0
Src Prefix Length : 32
Dest Port Start : 0
Dest Port End : 65535
Forwarded : 0
Received : 0

Cfr Id : 7
State : enable
Priority : 0
Dest IP : 231.1.1.7
Src IP : 0.0.0.0
Src Prefix Length : 32
Dest Port Start : 0
Dest Port End : 65535
Forwarded : 0
Received : 0

Cfr Id : 8
State : enable
Priority : 0
Dest IP : 231.1.1.8
Src IP : 0.0.0.0
Src Prefix Length : 32
Dest Port Start : 0
Dest Port End : 65535

Cisco CMTS Router Service Features Configuration Guide


35
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Monitor and Debug the Advanced-mode DOCSIS Set-Top Gateway Feature

Forwarded : 0
Received : 0

Client List Id : 1
Client Id : 1
Client Id Type : MAC Addr 0100.5e00.0001
Client Id : 2
Client Id Type : Application ID 0x0951
Client Id : 3
Client Id Type : Broadcast Unspecified
Client Id : 4
Client Id Type : Broadcast 4

Interface : Cable5/0
Rule Id : 1

show cable dsg tg


The below example illustrates configured parameters for all DSG tunnel groups.
Router# show cable dsg tg

TG Chan Chan Rule Vendor UCID


id id state I/F pri Param list
1 1 en C5/0 16 1 1 2 3 4
1 2 en 0
2 1 en C5/0 11 2
C5/1
2 2 en 0

Note Beginning with Cisco IOS Release 12.2(33)SCG, the “TG state” field in the show cable dsg tg
command output was replaced by “Chan state” to indicate that a channel belonging to a tunnel group is
either enabled or diabled. It is possible that a tunnel group is enabled but a particular channel in that
tunnel group is disabled.

The below example displays the same information as above for the specified tunnel group.
Router# show cable dsg tg 1 channel 1

TG Chan Chan Rule Vendor UCID


id id state I/F pri Param list
1 1 en C5/0 16 1 1 2 3 4

The below example illustrates detailed information for the specified tunnel group.
Router# show cable dsg tg 1 channel 1 verbose

TG: 1 Chan: 1 state: en pri: 16 Vendor: 1 UCID: 1 2 3 4


rule tunnel cfr clients
I/F id state id state mac-addr id state dest-ip In-DCD listId
C5/0 1 en 1 en 0101.5e01.0001 1 en 230.1.0.1 yes 1
6 en 231.1.1.6 no
7 en 231.1.1.7 no
8 en 231.1.1.8 no
2 en 2 en 0101.5e01.0002 2 en 230.1.0.2 yes 2
3 en 3 en 0101.5e01.0003 3 en 230.1.0.3 yes 3

Cisco CMTS Router Service Features Configuration Guide


36
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Monitor and Debug the Advanced-mode DOCSIS Set-Top Gateway Feature

The following is a sample output for the show cable dsg tg command that displays the ignore option,
introduced in Cisco IOS Release 12.2(33)SCD5, under the ‘In DCD’ column.
Router# show cable dsg tg 1 channel 1 verbose

TG: 1 Chan: 1 state: en pri: 16 Vendor: 1 UCID: 1 2 3 4


rule tunnel cfr clients
I/F id state id state mac-addr id state dest-ip In-DCD listId
------ -------- ------------------------ ------------------------- --- -------
C7/0/0 1 en 1 en 0101.5e01.0001 1 en 230.1.0.1 ign 1
6 en 231.1.1.6 no
7 en 231.1.1.7 no
8 en 231.1.1.8 no
2 en 2 en 0101.5e01.0002 2 en 230.1.0.2 yes 2
3 en 3 en 0101.5e01.0003 3 en 230.1.0.3 yes 3

show running-config interface


To display a tunnel group attached to a subinterface, use the show running-config interface command
in privileged EXEC mode, as shown in the example below:
Router# show running-config interface bundle 11.2
!
interface Bundle11.2
ip address 4.4.2.1 255.255.255.0
no ip unreachables
ip pim sparse-mode
ip igmp static-group 230.1.1.30
no cable ip-multicast-echo
cable dsg tg 61
end

Note The IGMP static group IP address created automatically at the time of DSG configuration is not
displayed in the show running-config interface command output in Cisco IOS Release 12.2(33)SCG
and later.

show cable dsg static-group bundle


To verify all DSG static groups configured under a bundle interface, use the
show cable dsg static-group bundle command in privileged EXEC mode as shown in the following
example:
Router# show cable dsg static-group bundle 2

Bundle Interface Group Source

Bundle2 228.0.0.1 0.0.0.0


Bundle2 228.0.0.1 1.2.3.4
Bundle2 232.1.1.1 2.3.4.5

Cisco CMTS Router Service Features Configuration Guide


37
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Monitor and Debug the Advanced-mode DOCSIS Set-Top Gateway Feature

Displaying Interface-level Configurations for Advanced-Mode DSG 1.2


The following show commands display interface-level configurations for A-DSG 1.2.
• show cable dsg tunnel interfaces
• show interfaces cable dsg downstream
• show interfaces cable dsg downstream dcd
• show interfaces cable dsg downstream tg
• show interfaces cable dsg downstream tunnel

show cable dsg tunnel interfaces


To display all interfaces and DSG rules for the associated tunnel, use the show cable dsg tunnel
interfaces command in privileged EXEC mode.
show cable dsg tunnel (tunnel-id) interfaces
The following example illustrates this command:
Router# show cable dsg tunnel 1 interfaces
tunnel downstream rule
id interface id
4 Cable5/0 4
Cable5/1 1

show interfaces cable dsg downstream


To display DSG downstream interface configuration information, to include the number of DSG tunnels,
classifiers, clients, and vendor-specific parameters, use the show interfaces cable dsg downstream
command in privileged EXEC mode.
show interfaces cable {slot/port | slot/subslot/port} dsg downstream
Keywords for this command include the following:
• dcd—Displays the DSG downstream DCD message.
• tg—Displays the DSG downstream tunnel group.
• tunnel—Displays the DSG downstream tunnel.

The following example illustrates this command supporting DSG 1.2:


Router# show interfaces c5/0 dsg downstream

chan chFreq chan timer init oper twoWay oneWay num num num num num
list index freq index timeout timeout timer timer rule tunnel cfr client vsp
1 1 471 1 4 600 300 1800 6 6 3 4 2
2 477
3 483
4 583

Cisco CMTS Router Service Features Configuration Guide


38
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Monitor and Debug the Advanced-mode DOCSIS Set-Top Gateway Feature

show interfaces cable dsg downstream dcd


To display DCD statistics for the given downstream, use the show interfaces cable dsg downstream
dcd command in privileged EXEC mode. This command only displays DCD Type/Length/Value
information if the debug cable dsg command is previously enabled.
show interfaces cable {slot/port | slot/subslot/port} dsg downstream dcd
The following example illustrates DCD statistics information supporting DSG 1.2:
Router# show interfaces c5/0 dsg downstream dcd

dcd dcd num of dcd num of dcd num of dcd num of


state Tx sent fail change cnt fragment
en on 6502 0 28 1

Router# debug cable dsg

CMTS DSG debugging is on


Router#

Router# show interfaces c5/0 dsg downstream dcd

dcd dcd num of dcd num of dcd num of dcd num of


state Tx sent fail change cnt fragment
en on 6512 0 28 1

Router#
02:08:42: DCD TLV last sent:
32360101 01020110 03040102 03040412 02060100 5E000001 04020951 01000102
00040506 01005E01 00010602 00012B08 08030000 01010101 170F0202 00010501
00090605 04E60100 01322801 01020201 10030401 02030404 0403020A BC050601
005E0100 02060200 022B0808 03000001 01010117 0F020200 02050100 09060504
E6010002 32280101 03020110 03040102 03040404 04020123 05060100 5E010003
06020003 2B080803 00000101 0101170F 02020003 05010009 060504E6 01000332
38010104 02010B04 12020601 005E0000 01040209 51010001 02000405 06000200
0200012B 09080300 00010102 01022B09 08030000 02010201 02322A01 01050201
0B040403 020ABC05 06000200 0200022B 09080300 00010102 01022B09 08030000
02010201 02324601 01060201 0B042002 06002100 21000102 06002100 21000202
06002100 21000302 06002100 21000405 06000200 0200032B 09080300 00010102
01022B09 08030000 02010201 02332801 041C12E3 C001041C 6E714001 041CC9FE
C0010422 BFDFC002 02000403 02025804 02012C05 020708

show interfaces cable dsg downstream tg


To display DSG tunnel group parameters, and rule information applying to the tunnel group, to include
tunnels and tunnel states, classifiers, and client information, use the show interfaces cable dsg
downstream tg command in privileged EXEC mode. You can display information for a specific tunnel,
if specified.
show interfaces cable {slot/port | slot/subslot/port} dsg downstream tg [channel channel-id]

Cisco CMTS Router Service Features Configuration Guide


39
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
How to Monitor and Debug the Advanced-mode DOCSIS Set-Top Gateway Feature

The following example illustrates typical information displayed with this command in DSG 1.2:
Router# show interfaces c5/0 dsg downstream tg

TG: 1 Chan: 1 state: en pri: 16 Vendor: 1 UCID: 1 2 3 4

rule tunnel cfr client


I/F id state id state mac-addr id state dest-ip In-DCD listId
C5/0 1 en 1 en 0101.5e01.0001 1 en 230.1.0.1 yes 1
6 en 231.1.1.6 no
7 en 231.1.1.7 no
8 en 231.1.1.8 no
2 en 2 en 0101.5e01.0002 2 en 230.1.0.2 yes 2
3 en 3 en 0101.5e01.0003 3 en 230.1.0.3 yes 3

TG: 2 Chan: 1 state: en pri: 11 Vendor: 2 UCID:

rule tunnel cfr client


I/F id state id state mac-addr id state dest-ip In-DCD listId
C5/0 4 en 4 en 0002.0002.0001 4 en 230.2.2.1 no 1
5 en 5 en 0002.0002.0002 5 en 230.2.2.2 no 2
6 en 6 en 0002.0002.0003 9 en 231.1.1.9 no 21

The following examples displays the same type of information as above for the given tunnel group.
Router# show interfaces c5/0 dsg downstream tg 1 channel 1

TG: 1 Chan: 1 state: en pri: 16 Vendor: 1 UCID: 1 2 3 4

rule tunnel cfr client


I/F id state id state mac-addr id state dest-ip In-DCD listId
C5/0 1 en 1 en 0101.5e01.0001 1 en 230.1.0.1 yes 1
6 en 231.1.1.6 no
7 en 231.1.1.7 no
8 en 231.1.1.8 no
2 en 2 en 0101.5e01.0002 2 en 230.1.0.2 yes 2
3 en 3 en 0101.5e01.0003 3 en 230.1.0.3 yes 3

The following is a sample output for the show interfaces cable dsg downstream tg command that
displays the ignore option, introduced in Cisco IOS Release 12.2(33)SCD5, under the ‘In DCD’ column.
Router# show interfaces cable 7/0/0 dsg downstream tg

TG: 1 Chan: 1 State: en Pri: 0 Vendor: UCID:

rule tunnel cfr In clients


id state id state mac-addr id state dest-ip DCD listId
-------- ------------------------ ------------------------- --- -------
1 en 1 en 0100.5e01.0101 1 en 230.1.1.1 ign 1

show interfaces cable dsg downstream tunnel


To display DSG tunnel information associated with the downstream, use the show interfaces cable dsg
downstream tunnel command in privileged EXEC mode.
show interfaces cable {slot/port | slot/subslot/port} dsg downstream tunnel tunnel-id

Cisco CMTS Router Service Features Configuration Guide


40
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
Configuration Examples for Advanced-Mode DSG

The following is a sample output for the show interfaces cable dsg downstream tunnel command that
displays the interface information for the DSG downstream tunnel in DSG 1.2:
Router# show interfaces c5/0 dsg downstream tunnel

tunnel TG cfr rule client service


id state mac-addr id id state id state listId class
1 en 0100.5e01.0001 1 1 en 1 en 1 DSG-Rate1
6 en
7 en
8 en
2 en 0100.5e01.0002 1 2 en 2 en 2
3 en 0100.5e01.0003 1 3 en 3 en 3
4 en 0002.0002.0001 2 4 en 4 en 1
5 en 0002.0002.0002 2 5 en 5 en 2 DSG-Rate2
6 en 0002.0002.0003 2 9 en 6 en 21

The following is a sample output for the show interfaces cable dsg downstream tunnel command that
displays information for the specified interface and tunnel:
Router# show interfaces c5/0 dsg downstream tunnel 1

tunnel TG cfr rule client service


id state mac-addr id id state id state listId class
1 en 0100.5e01.0001 1 1 en 1 en 1 DSG-Rate1
6 en
7 en
8 en

Debugging Advanced-Mode DSG


To enable debugging for A-DSG on a Cisco CMTS router, use the debug cable dsg command in
privileged EXEC mode.

Configuration Examples for Advanced-Mode DSG


This configuration example illustrates a sample DSG network featuring these components:
• Two Cisco universal broadband routers
• IP Multicast for each DSG implementation
• Two DSG Clients for each Cisco CMTS
• Two DSG Servers (one for each Cisco CMTS)

Cisco CMTS Router Service Features Configuration Guide


41
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
Configuration Examples for Advanced-Mode DSG

Each Cisco CMTS is configured as follows, and the remainder of this topic describes example
configurations that apply to this architecture.

CMTS Headend #1
• DSG Server #1—Connected to Cisco CMTS via IP Multicast, with DSG Server having IP Address
12.8.8.1
• Destination IP Address for the Cisco CMTS—228.9.9.1
• DSG Tunnel Address—0105.0005.0005
• Downstream #1 Supporting two DSG Clients:
– DSG Client #1—ID 101.1.1
– DSG Client #2—ID 102.2.2

CMTS Headend #2
• DSG Server #2—Connected to Cisco CMTS via IP Multicast, with DSG Server having IP Address
12.8.8.2
• Destination IP Address for the Cisco CMTS—228.9.9.2
• DSG Tunnel Address—0106.0006.0006
• Downstream #2 Supporting two DSG Clients:
– DSG Client #1—ID 101.1.1
– DSG Client #2—ID 102.2.2

Example of Two DSG Tunnels with MAC DA Substitution


In this configuration, and given the two Cisco CMTS Headends cited above, below are the two sets of
DSG rules, with each set applying to each Cisco CMTS, in respective fashion.
These settings apply to DSG #1 and two downstreams:
• DSG Rule ID 1
• DSG Client ID 101.1.1
• DSG Tunnel Address 105.5.5
These settings apply to DSG Rule #2 and two downstreams:
• DSG Rule ID 1
• DSG Client ID 102.2.2
• DSG Tunnel Address 106.6.6

DSG Example with Regionalization Per Downstream


In this configuration, and given the two Cisco CMTS Headends cited earlier in this topic, below are two
downstream rules that can be configured in this architecture, for example:
• Downstream Rule #1
– DSG Rule ID #1
– DSG Client ID—101.1.1
– DSG Tunnel Address—105.5.5

Cisco CMTS Router Service Features Configuration Guide


42
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
Configuration Examples for Advanced-Mode DSG

• Downstream Rule #2
– DSG Rule ID #2
– DSG Client ID—102.2.2
– DSG Tunnel Address—106.6.6

DSG Example with Regionalization Per Upstream


In this configuration, and given the two Cisco CMTS Headends cited earlier in this topic, below are two
upstream rules that can be configured in this architecture, for example:
• Upstream Rule #1
– DSG Rule ID #1
– DSG Client ID—101.1.1
– DSG UCID Range—0 to 2
– DSG Tunnel Address—105.5.5
• Upstream Rule #2
– DSG Rule ID #2
– DSG Client ID—102.2.2
– DSG UCID Range—3 to 5
– DSG Tunnel Address—106.6.6

Example of Two DSG Tunnels with Full Classifiers and MAC DA Substitution
In this configuration, and given the two Cisco CMTS Headends cited above, below are the two sets of
DSG rules, with each set applying to each Cisco CMTS, in respective fashion.
These settings apply to DSG #1:
• DSG Rule ID 1
• Downstreams 1 and 2
• DSG Client ID 101.1.1
• DSG Tunnel Address 105.5.5
• DSG Classifier ID—10
• IP SA—12.8.8.1
• IP DA—228.9.9.1
• UDP DP—8000

Cisco CMTS Router Service Features Configuration Guide


43
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
Configuration Examples for Advanced-Mode DSG

These settings apply to DSG Rule #2:


• DSG Rule ID 2
• Downstreams 1 and 2
• DSG Client ID 102.2.2
• DSG Tunnel Address 106.6.6
• DSG Classifier ID—20
• IP SA—12.8.8.2
• IP DA—228.9.9.2
• UDP DP—8000

Example of One DSG Tunnel Supporting IP Multicast from Multiple DSG Servers
In this configuration, and given the two Cisco CMTS Headends cited earlier in this topic, below is an
example of one DSG Tunnel with multiple DSG servers supporting IP Multicast:
• DSG Rule ID 1
• Downstreams 1 and 2
• DSG Client ID 101.1.1 and 102.2.2
• DSG Tunnel Address 105.5.5
• DSG Classifier ID—10
– IP SA—12.8.8.1
– IP DA—228.9.9.1
– UDP DP—8000
• DSG Classifier ID—20
– IP SA—12.8.8.2
– IP DA—228.9.9.2
– UDP DP—8000

Example: Enabling DNS Query


The following example shows how to enable a DNS query on the Cisco CMTS router:
Router# configure terminal
Router(config)# ip domain-lookup
Router(config)# ip domain-name cisco.com
Router(config)# ip name-server 131.108.1.111
Router(config)# cable dsg name-update-interval 10
Router(config)# end

Cisco CMTS Router Service Features Configuration Guide


44
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
Additional References

Example: Disabling A-DSG Forwarding on the Primary Channel


The following example shows how to disable A-DSG forwarding on a primary capable modular interface
on the Cisco CMTS router:
Router# configure terminal
Router(config)# interface modular-cable 1/0/0:0
Router(config-if)# cable downstream dsg disable
Router(config-if)# end

Additional References
The following sections provide references related to A-DSG 1.2.

Related Documents
Related Topic Document Title
Cisco CMTS Commands Cisco IOS CMTS Cable Command Reference
http://www.cisco.com/en/US/docs/ios/cable/command/reference/cbl_bo
ok.html
DOCSIS 3.0 Multicast Support on the CMTS DOCSIS 3.0 Multicast Support on the CMTS Routers
Routers
http://www.cisco.com/en/US/docs/ios/cable/configuration/guide/ubr_d3
0_mcast_support.html

Standards
Standard Title
CM-SP-DSG-I18-110623 DOCSIS Set-top Gateway (DSG) Interface Specification

MIBs
MIB MIBs Link
DOCS-DSG-IF-MIB To locate and download MIBs for selected platforms, Cisco IOS
releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs

Cisco CMTS Router Service Features Configuration Guide


45
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
Feature Information for Advanced-Mode DSG 1.2 for the Cisco CMTS Routers

RFCs
RFCs Title
No new or modified RFCs are supported by this —
feature, and support for existing RFCs has not been
modified.

Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.

Feature Information for Advanced-Mode DSG 1.2 for the Cisco


CMTS Routers
Table 2 lists the release history for this feature.
Use Cisco Feature Navigator to find information about platform support and software image support.
Cisco Feature Navigator enables you to determine which software images support a specific software
release, feature set, or platform. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn.
An account on Cisco.com is not required.

Note Table 2 lists only the software release that introduced support for a given feature in a given software
release train. Unless noted otherwise, subsequent releases of that software release train also support that
feature.

Table 2 Feature Information for DOCSIS Set-Top Gateway and A-DSG for the Cisco CMTS Routers

Feature Name Releases Feature Information


DOCSIS Set-Top Gateway for the Cisco CMTS 12.2(15)BC2 This feature was introduced for the Cisco uBR7100
Routers series and Cisco uBR7246VXR universal broadband
routers.
DOCSIS Set-Top Gateway for the Cisco CMTS 12.3(9a)BC Support for the Cisco uBR10012 universal broadband
Routers router was added.
Advanced-mode DOCSIS Set-Top Gateway 1.1 Release This feature was introduced to support DOCSIS 1.1 on
for the Cisco CMTS Routers 12.3(13)BC the Cisco uBR7200 Series and Cisco uBR10012
universal broadband routers.

Cisco CMTS Router Service Features Configuration Guide


46
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
Feature Information for Advanced-Mode DSG 1.2 for the Cisco CMTS Routers

Table 2 Feature Information for DOCSIS Set-Top Gateway and A-DSG for the Cisco CMTS Routers

Feature Name Releases Feature Information


Advanced-mode DOCSIS Set-Top Gateway 1.2 12.3(17a)BC2 This feature was introduced on the Cisco
for the Cisco CMTS Routers uBR7246VXR and Cisco uBR10012 universal
broadband routers.
Advanced-mode DOCSIS Set-Top Gateway 1.2 12.2(33)SCA This feature was integrated into Cisco IOS Release
for the Cisco CMTS Routers 12.2(33)SCA. Support for the Cisco uBR7225VXR
universal broadband router was added.
Advanced-mode DOCSIS Set-Top Gateway 1.2 12.2(33)SCB4 This feature was introduced on the Cisco
on a Subinterface for the Cisco CMTS Routers uBR7246VXR and Cisco uBR10012 universal
broadband routers.
Default Multicast QoS 12.2(33)SCC1 This feature was modified to configure the service class
name of the default multicast quality of service
(MQoS) for the QoS profile.
The following command was introduced or modified:
• cable multicast group-qos default
Advanced-mode DOCSIS Set-Top Gateway 1.2 12.2(33)SCC1 This feature was integrated into Cisco IOS Release
on a Subinterface for the Cisco CMTS Routers 12.2(33)SCC1.
Advanced-mode DOCSIS Set-Top Gateway 1.2 12.2(33)SCD Support was added for the Cisco uBR-MC88V line
on a Subinterface for the Cisco CMTS Routers card.
Advanced-mode DOCSIS Set-Top Gateway 1.2 12.2(33)SCD5 This feature was modified to add the ignore option to
on a Subinterface for the Cisco CMTS Routers the in-dcd keyword of the cable dsg cfr command to
exclude DSG classifiers from the DCD message and
enable the DSG rules regardless of the DSG tunnel
MAC address.
The following commands were introduced or modified:
• cable dsg cfr
• show cable dsg tg
• show interfaces cable dsg downstream tg
FQDN Support 12.2(33)SCG You can specify either an FQDN or IP address while
configuring an A-DSG classifier on a Cisco CMTS
router.
The following commands were introduced or modified:
• cable dsg cfr
• cable dsg tg default-priority
• cable dsg tg priority
• debug cable dsg
• show cable dsg cfr
• show cable dsg host

Cisco CMTS Router Service Features Configuration Guide


47
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
Feature Information for Advanced-Mode DSG 1.2 for the Cisco CMTS Routers

Table 2 Feature Information for DOCSIS Set-Top Gateway and A-DSG for the Cisco CMTS Routers

Feature Name Releases Feature Information


DNS Query and DSG Name Process 12.2(33)SCG One or more DNS servers must be configured to enable
a Cisco CMTS router to perform a DNS query. The
cable dsg name-update-interval command was
introduced to support this feature.
The following sections provide information about this
feature:
• “Information About Advanced-Mode DSG Issue
1.2” section on page 4
• “How to Configure Advanced-Mode DSG Issue
1.2” section on page 7
DOCSIS 3.0 DSG MDF Support 12.2(33)SCG DOCSIS 3.0 DSG MDF support is introduced using
DSG DA-to-DSID Association Entry TLV in the MDD
message. For details about this feature, see
“Information About Advanced-Mode DSG Issue 1.2”
section on page 4.
A-DSG Forwarding on the Primary Channel 12.2(33)SCG This feature allows you to exclude a primary capable
interface from A-DSG forwarding.
The following sections provide information about this
feature:
• “Information About Advanced-Mode DSG Issue
1.2” section on page 4
• “How to Configure Advanced-Mode DSG Issue
1.2” section on page 7
The following commands were introduced or modified:
• cable downstream dsg disable
• cable downstream dsg tg
• show cable dsg static-group bundle
• show interface cable dsg downstream

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of
Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The
use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and
figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and
coincidental.

©2009-2012 Cisco Systems, Inc. All rights reserved.

Cisco CMTS Router Service Features Configuration Guide


48
Call Home Feature for the Cisco CMTS Routers

First Published: November 29, 2010

Note Use this document in conjunction with the Configuring Call Home for Cisco 7200 Series Routers feature
guide.

For Cisco IOS Release 12.2(33)SCE, the Call Home feature provides a mechanism to automatically
create cases and update Cisco, customer, or a partner about events and changes on a Cisco device in a
customer network. This feature provides e-mail and web-based notification of critical system events.
Multiple message formats are available for optimum compatibility with pager services, e-mail, or
XML-based automated parsing applications. Common uses of this feature include paging a network
support engineer, sending an e-mail notification to a Network Operations Center, XML-based message
delivery to a support website, and generating a direct case with the Cisco Systems Technical Assistance
Center (TAC).
For more information, see the Configuring Call Home for Cisco 7200 Series Routers feature guide.

Finding Feature Information


Your software release may not support all the features documented in this module. For the latest feature
information and caveats, see the release notes for your platform and software release. To find information
about the features documented in this module, and to see a list of the releases in which each feature is
supported, see the Feature Information for the Call Home Feature for the Cisco CMTS Routers, page 80.
Use Cisco Feature Navigator to find information about platform support and Cisco software image
support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on
Cisco.com is not required.

Contents
• Prerequisites for the Call Home Feature for the Cisco CMTS Routers, page 50
• Information About the Call Home Feature for the Cisco CMTS Routers, page 50

Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Call Home Feature for the Cisco CMTS Routers
Prerequisites for the Call Home Feature for the Cisco CMTS Routers

Prerequisites for the Call Home Feature for the Cisco CMTS
Routers
Table 1 shows the hardware compatibility matrix for this feature.

Note The hardware components introduced in a given Cisco IOS Release are supported in all subsequent
releases unless otherwise specified.

Table 1 Call Home Feature for the Cisco CMTS Routers - Hardware Compatibility Matrix

CMTS Platform Processor Engine Cable Interface Cards SIP/SPA


Cisco uBR10012 Cisco IOS Release Cisco IOS Release Cisco Wideband SPA
Universal Broadband 12.2(33)SCE and later 12.2(33)SCE and later
Router releases releases
• PRE2 • Cisco
uBR10-MC5X20U/H
• PRE4
• Cisco
UBR-MC20X20V
• Cisco
uBR-MC3GX60V1
1. The Cisco uBR-MC3GX60V cable interface line card is not compatible with PRE2. You must use PRE4 with the Cisco
uBR3GX60V cable interface line card.

Note For support of this feature on the Cisco uBR 7200 series universal broadband routers, see the
Configuring Call Home for Cisco 7200 Series Routers feature guide.

Information About the Call Home Feature for the Cisco CMTS
Routers
The Call Home feature provides a reactive support mode of operation triggered by various system events
on a Cisco uBR10012 universal broadband router. This feature also supports a proactive support mode
where configuration and inventory change messages are automatically reported to a destination target
specified in the system profile.
You can specify a Call Home Server on the Cisco network as a destination target.
The Call Home functionality in a Cisco device is provided by one or more network devices or through
an appliance, such as the Smart Call Home server. Each system event provides a set of call home triggers
required for reactive mode situations, for example, hardware failures.
The Call Home function can leverage Cisco, customer, or a partner support. Flexible message delivery
and format options allow for easy integration of specific support requirements into the Call Home and
Call Home Server.
For more information on setting up and configuring this feature, see the Configuring Call Home for
Cisco 7200 Series Routers feature guide.

Cisco CMTS Router Service Features Configuration Guide


50
Call Home Feature for the Cisco CMTS Routers
Information About the Call Home Feature for the Cisco CMTS Routers

Subscribing to Alert Groups


An alert group is a predefined subset of Call Home alerts supported in all Cisco universal broadband
routers. Different Call Home alerts are classified into different groups depending on their type. For
Cisco IOS Release 12.2(33)SCE, the alert groups are:
• Configuration
• Inventory
• Syslog

Sample Configuration Alert Notification in XML Format


<?xml version="1.0" encoding="UTF-8"?>
<soap-env:Envelope xmlns:soap-env="http://www.w3.org/2003/05/soap-envelope">
<soap-env:Header>
<aml-session:Session xmlns:aml-session="http://www.cisco.com/2004/01/aml-session"
soap-env:mustUnderstand="true"
soap-env:role="http://www.w3.org/2003/05/soap-envelope/role/next">
<aml-session:To>http://tools.cisco.com/neddce/services/DDCEService</aml-session:To>
<aml-session:Path>
<aml-session:Via>http://www.cisco.com/appliance/uri</aml-session:Via>
</aml-session:Path>
<aml-session:From>http://www.cisco.com/appliance/uri</aml-session:From>
<aml-session:MessageId>MC2:SPE100202ZH:D060082A</aml-session:MessageId>
</aml-session:Session>
</soap-env:Header>
<soap-env:Body>
<aml-block:Block xmlns:aml-block="http://www.cisco.com/2004/01/aml-block">
<aml-block:Header>
<aml-block:Type>http://www.cisco.com/2005/05/callhome/configuration</aml-block:Type>
<aml-block:CreationDate>2010-10-13 10:27:54 GMT+00:00</aml-block:CreationDate>
<aml-block:Builder>
<aml-block:Name>uBR10000</aml-block:Name>
<aml-block:Version>2.0</aml-block:Version>
</aml-block:Builder>
<aml-block:BlockGroup>
<aml-block:GroupId>GC3:SPE100202ZH:D060082A</aml-block:GroupId>
<aml-block:Number>0</aml-block:Number>
<aml-block:IsLast>true</aml-block:IsLast>
<aml-block:IsPrimary>true</aml-block:IsPrimary>
<aml-block:WaitForPrimary>false</aml-block:WaitForPrimary>
</aml-block:BlockGroup>
<aml-block:Severity>1</aml-block:Severity>
</aml-block:Header>
<aml-block:Content>
<ch:CallHome xmlns:ch="http://www.cisco.com/2005/05/callhome" version="1.0">
<ch:EventTime>2010-10-13 10:27:39 GMT+00:00</ch:EventTime>
<ch:MessageDescription>Configuration Change</ch:MessageDescription>
<ch:Event>
<ch:Type>configuration</ch:Type>
<ch:SubType>delta</ch:SubType>
<ch:Brand>Cisco Systems</ch:Brand>
<ch:Series>Cisco uBR10K Series Routers</ch:Series>
</ch:Event>
<ch:CustomerData>
<ch:UserData>
<ch:Email>[email protected]</ch:Email>
</ch:UserData>
<ch:ContractData>

Cisco CMTS Router Service Features Configuration Guide


51
Call Home Feature for the Cisco CMTS Routers
Information About the Call Home Feature for the Cisco CMTS Routers

<ch:CustomerId></ch:CustomerId>
<ch:SiteId></ch:SiteId>
<ch:ContractId></ch:ContractId>
<ch:DeviceId>UBR10012@C@SPE100202ZH</ch:DeviceId>
</ch:ContractData>
<ch:SystemInfo>
<ch:Name>router</ch:Name>
<ch:Contact></ch:Contact>
<ch:ContactEmail>[email protected]</ch:ContactEmail>
<ch:ContactPhoneNumber></ch:ContactPhoneNumber>
<ch:StreetAddress></ch:StreetAddress>
</ch:SystemInfo>
</aml-block:Builder>
<aml-block:BlockGroup>
<aml-block:GroupId>GC3:SPE100202ZH:D060082A</aml-block:GroupId>
<aml-block:Number>0</aml-block:Number>
<aml-block:IsLast>true</aml-block:IsLast>
<aml-block:IsPrimary>true</aml-block:IsPrimary>
<aml-block:WaitForPrimary>false</aml-block:WaitForPrimary>
</aml-block:BlockGroup>
<aml-block:Severity>1</aml-block:Severity>
</aml-block:Header>
<aml-block:Content>
<ch:CallHome xmlns:ch="http://www.cisco.com/2005/05/callhome" version="1.0">
<ch:EventTime>2010-10-13 10:27:39 GMT+00:00</ch:EventTime>
<ch:MessageDescription>Configuration Change</ch:MessageDescription>
<ch:Event>
<ch:Type>configuration</ch:Type>
<ch:SubType>delta</ch:SubType>
<ch:Brand>Cisco Systems</ch:Brand>
<ch:Series>Cisco uBR10K Series Routers</ch:Series>
</ch:Event>
<ch:CustomerData>
<ch:UserData>
<ch:Email>[email protected]</ch:Email>
</ch:UserData>
<ch:ContractData>
<ch:CustomerId></ch:CustomerId>
<ch:SiteId></ch:SiteId>
<ch:ContractId></ch:ContractId>
<ch:DeviceId>UBR10012@C@SPE100202ZH</ch:DeviceId>
</ch:ContractData>
<ch:SystemInfo>
<ch:Name>router</ch:Name>
<ch:Contact></ch:Contact>
<ch:ContactEmail>[email protected]</ch:ContactEmail>
<ch:ContactPhoneNumber></ch:ContactPhoneNumber>
<ch:StreetAddress></ch:StreetAddress>
</ch:SystemInfo>
<ch:CCOID></ch:CCOID>
</ch:CustomerData>
<ch:Device>
<rme:Chassis xmlns:rme="http://www.cisco.com/rme/4.0">
<rme:Model>UBR10012</rme:Model>
<rme:HardwareVersion>257</rme:HardwareVersion>
<rme:SerialNumber>SPE100202ZH</rme:SerialNumber>
<rme:AdditionalInformation>
<rme:AD name="PartNumber" value="800-09026-03" />
<rme:AD name="SoftwareVersion" value="12.2(20100929:171810)" />
<rme:AD name="SystemObjectId" value="1.3.6.1.4.1.9.1.317" />
<rme:AD name="SystemDescription" value="Cisco IOS Software, 10000 Software
(UBR10K4-K9P6U2-M), Experimental Version 12.2(20100929:171810) [username-card 111]
Copyright (c) 1986-2010 by Cisco Systems, Inc.
Compiled Wed 29-Sep-10 10:18 by username" />

Cisco CMTS Router Service Features Configuration Guide


52
Call Home Feature for the Cisco CMTS Routers
Information About the Call Home Feature for the Cisco CMTS Routers

</rme:AdditionalInformation>
</rme:Chassis>
</ch:Device>
</ch:CallHome>
</aml-block:Content>
<aml-block:Attachments>
<aml-block:Attachment type="inline">
<aml-block:Name>show diag</aml-block:Name>
<aml-block:Data encoding="plain">
<![CDATA[
Slot A:
Active PRE card
RP EEPROM contents:
Controller Type : 1443
Hardware Revision : 1.0
PCB Part Number : 73-10867-03
Board Revision : B0
Deviation Number : 0-0
Fab Version : 05
PCB Serial Number : CAT1336F051
RMA Test History : 00
RMA Number : 0-0-0-0
RMA History : 00
Top Assy. Part Number : 800-28163-03
CLEI Code : IPUCAM3BAC
Product Identifier (PID) : ESR-PRE4
Version Identifier (VID) : V03
FP EEPROM contents:
Controller Type : 1442
Hardware Revision : 1.0
PCB Part Number : 73-10866-03
Board Revision : B0
Deviation Number : 0-0
Fab Version : 04
PCB Serial Number : CAT1403F1JT
RMA Test History : 00
RMA Number : 0-0-0-0
RMA History : 00
Operational Image Version, Slot A
Cisco IOS Software, 10000 Software (UBR10K4-K9P6U2-M), Experimental Version
12.2(20100929:171810) [uname-card 111]
Copyright (c) 1986-2010 by Cisco Systems, Inc.
Compiled Wed 29-Sep-10 10:18 by uname
Reset reason 0x00000002 (software reset)

Slot B:
Standby PRE card
RP EEPROM Contents:

Slot 1:
2jacket-1 card, 0 ports
Card is full slot size
Card is analyzed
Card detected 2d06