Table Of Contents
Cable Duplicate MAC Address Reject for the Cisco CMTS
Contents
Prerequisites for Cable Duplicate MAC Address Reject
Restrictions for Cable Duplicate MAC Address Reject
Information About Cable Duplicate MAC Address Reject
BPI+ Security and Cloned Cable Modems
Logging of Cloned Cable Modems
Enforcing DOCSIS BPI+ Compliance with Layer 2 Logging on the Cisco CMTS
System Messages Supporting Cable Duplicate MAC Address Reject
Command Reference
cable privacy bpi-plus-enforce
Additional Information
Cable Duplicate MAC Address Reject for the Cisco CMTS
Revised: February 5, 2007, OL-1467-08
Cisco IOS Release 12.3(21)BC introduces a DOCSIS 1.1-compliant and above security enhancement that helps to eliminate denial-of-service (DOS) attacks that are caused by cloned cable modems. A clone is presumed to be one of two physical cable modems on the same Cisco CMTS chassis with the same HFC interface MAC address. The cloned cable modem may be DOCSIS 1.0 or greater, and may be semi-compliant or non-compliant with portions of the DOCSIS specifications.
This feature is enabled by default on the Cisco CMTS, and has no associated command-line interface (CLI) configuration commands. This feature creates a new log message. By default, this message appears in the syslog, but may be moved into the cable layer2 event log using the configuration command cable logging layer2events.
This document describes the Cloned Cable Modem Security Detection feature, introduces the cable privacy bpi-plus-enforce command, and cites additional commands and supporting documentation on Cisco.com and the Internet.
Finding Feature Information in This Module
Your Cisco IOS software release may not support all of the features documented in this module. To reach links to specific feature documentation in this module and to see a list of the releases in which each feature is supported, use the "Additional Information" section.
Finding Support Information for Platforms and Cisco IOS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at the login dialog box and follow the instructions that appear.
Contents
•
Prerequisites for Cable Duplicate MAC Address Reject
•
Restrictions for Cable Duplicate MAC Address Reject
•
Information About Cable Duplicate MAC Address Reject
•
Enforcing DOCSIS BPI+ Compliance with Layer 2 Logging on the Cisco CMTS
•
System Messages Supporting Cable Duplicate MAC Address Reject
•
Command Reference
•
Additional Information
Prerequisites for Cable Duplicate MAC Address Reject
This feature entails the following behaviors and prerequisites on the DOCSIS-compliant network:
•
The Cisco CMTS requires that the legitimate cable modem is DOCSIS 1.1 BPI+ compliant, meaning that it can come to one of the following four online states when provisioned with a DOCSIS configuration file containing at least one BPI+ related type/length value (TLV). For brevity, this document refers to these states as online(p_).
•
The Cisco CMTS gives priority to any cable modem that registers to the Cisco CMTS in any of the following four states:
–
online(pt)
–
online(pk)
–
online(ptd)
–
online(pkd)
The Cisco CMTS drops registration requests from another device that purports to use the same MAC address as an already operational modem that is in one of these four states.
Restrictions for Cable Duplicate MAC Address Reject
•
If the cable modem is not provisioned to use DOCSIS BPI+, as characterized by not coming online with the above initialization states of online(p_), then the existing behavior of the Cisco CMTS remains unchanged. The Cisco CMTS does not attempt to distinguish between two cable modems if the provisioning system does not provide a DOCSIS configuration file specifying BPI+ be enabled.
•
When this feature is enabled on the Cisco CMTS, the Cisco CMTS issues security breach notice in a log message in the cable logging layer2events log, or the generic log if the cable logging layer2events command is not configured on the Cisco CMTS.
Information About Cable Duplicate MAC Address Reject
This section explores DOCSIS BPI+ security in relation to cloned cable modems, and the behavior of this feature in networks involving compliant and non-compliant cable modems.
•
BPI+ Security and Cloned Cable Modems
•
Logging of Cloned Cable Modems
BPI+ Security and Cloned Cable Modems
This feature prioritizes cable modems that are online with Baseline Privacy Interface Plus (BPI+) security over new cable modem registration requests that use the same cable modem MAC address. As a result, the legitimate cable modem with BPI+ security certificates that match the HFC MAC address do not experience service disruption, even should a non-compliant cable modem with the same HFC MAC address attempt to register.
The detection function requires that a cable modem use DOCSIS 1.1 or higher, and be provisioned with BPI+ enabled. That is, one BPI+ TLV must be included in the DOCSIS configuration file. All DOCSIS 1.0 and DOCSIS 1.1 or greater cable modems that are provisioned without DOCSIS BPI+ enabled continue to use the legacy DOCSIS behavior, and experience a DOS attack when a cloned cable modem appears on the Cisco CMTS.
Cisco IOS Release 12.3(21)BC also introduces the cable privacy bpi-plus-enforce command, which is required for complete security using the Cloned Cable Modem Detection feature. This command mandates that a cable modem provisioned with BPI+ and DOCSIS 1.1 QOS must register with BPI+ and not use BPI. Commonly available non-DOCSIS-compliant cable modems contain an option to force registration in BPI as opposed to BPI+ mode even with DOCSIS 1.1 QOS and BPI+ specified in the DOCSIS configuration file.
Logging of Cloned Cable Modems
Cloned Cable Modems are detected and tracked with system logging. Due to the large number of DOCSIS layer 2 messages typically seen in a production network, a separate log is available to segregate these messages. If the cable logging layer2events command in global configuration mode is configured, Cloned Cable Modem messages are removed from the system log (syslog), and placed instead in the cable layer2logging.
A clone cable modem might attempt dozens of registration attempts in a short period of time. In order to suppress the number of log messages generated, the Cisco CMTS suppresses clone detected messages for approximately three minutes under certain conditions.
The log message provides the cable interface and MAC address of the cable modem attempting to register when another physical modem with that same MAC address is already in a state of online(P_) elsewhere on the Cisco CMTS.
Enforcing DOCSIS BPI+ Compliance with Layer 2 Logging on the Cisco CMTS
Perform these steps with the cable privacy bpi-plus-enforce command for the strongest DOCSIS BPI+ security and best performance of the Cloned Cable Modem Detection feature.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
cable privacy bpi-plus-enforce
4.
cable logging layer2events
5.
exit
6.
show cable logging
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router> enable
|
Enables privileged EXEC mode.
• Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
Router(config)#
|
Enters global configuration mode.
|
Step 3
|
cable privacy bpi-plus-enforce
Example:
Router(config)# cable privacy bpi-plus-enforce
|
Forces cable modems provisioned in DOCSIS 1.1 or higher to register with DOCSIS BPI+ security certificates, and not use the earlier DOCSIS BPI security.
|
Step 4
|
cable logging layer2events
Example:
Router# cable logging layer2events
|
Saves selected DOCSIS events that are specified in the Cisco CMTS MIB Registry to the cable logging buffer (instead of to the general logging buffer). This command supports Cloned Cable Modem Detection in Cisco IOS Release 12.3(21)BC and later releases.
|
Step 5
|
exit
Example:
Router(config)# exit
Router#
|
Returns to Privileged EXEC mode.
|
Step 6
|
show cable logging
Example:
Router# show cable logging
|
Displays whether the Layer 2 Logging feature is enabled, and displays the status of the logging buffer.
|
Examples
The following brief example illustrates logging messages that are created with the detection of cloned cable modems. In this example, the clone modem came online just before the legitimate modem, and was taken offline according to the legacy behavior. (The cable modem was not in online(p_) state when another modem with the same MAC address attempted to come online.)
SLOT 7/0: Nov 14 12:07:26: %UBR10000-6-CMMOVED: Cable modem 0007.0e03.3e71 has been moved
from interface Cable7/0/1 to interface Cable7/0/0.
Nov 14 12:07:57: %UBR10000-5-CLONED_CM_DETECTED: Cloned CM with MAC address 0013.7116.e726
access detected at Cable7/0/0 interface
Refer to the "System Messages Supporting Cable Duplicate MAC Address Reject" section for additional illustration of this feature and supporting system log messages.
What to Do Next
The Cloned Cable Modem Detection feature on the Cisco CMTS relates to multiple BPI+ certificate and DOCSIS 1.1 factors. Refer to additional information in this document for implementation of the Cloned Cable Modem Detection feature.
System Messages Supporting Cable Duplicate MAC Address Reject
The following example illustrates logged events for the Cloned Cable Modem Detection feature with activity that you may see with Cisco IOS Release 12.3(21)BC. This example uses the system image file ubr10k2-k9p6u2-mz.12.3(21)BC on a Cisco uBR10012 router with PRE2 modules.
In the below scenario, there are two cable modems with MAC addresses that have been cloned:
•
For MAC address 000f.66f9.48b1, the legitimate cable modem is on C5/0/0 upstream 0, and the cloned cable modem is on C7/0/0.
•
For MAC address 0013.7116.e726, the legitimate cable modem is on C7/0/0 upstream 0, and the cloned cable modem is also on the same interface.
•
In the below example, the CMMOVED message occurred because the cloned cable modem for MAC address 000f.66f9.48b1 came online before the legitimate cable modem.
•
There is no CMMOVED message for the cable modem on interface C7/0/0 with MAC address 0013.7116.e726 because the legitimate cable modem came online with state of online(pt) before the cloned cable modem attempted to come online.
Dec 5 13:08:18: %UBR10000-6-CMMOVED: Cable modem 000f.66f9.48b1 has been moved from
interface Cable7/0/0 to interface C able5/0/0.
Dec 5 13:08:44: %UBR10000-5-CLONED_CM_DETECTED: Cloned CM with MAC address 0013.7116.e726
connection attempt rejected o n Cable7/0/0 U0
Dec 5 13:10:48: %UBR10000-5-CLONED_CM_DETECTED: Cloned CM with MAC address 000f.66f9.48b1
connection attempt rejected on Cable7/0/0 U1
Dec 5 13:12:37: %UBR10000-5-CLONED_CM_DETECTED: Cloned CM with MAC address 0013.7116.e726
connection attempt rejected on Cable7/0/0 U0
Dec 5 13:18:28: %UBR10000-5-CLONED_CM_DETECTED: Cloned CM with MAC address 0013.7116.e726
connection attempt rejected on Cable7/0/0 U0
Dec 5 13:18:28: %UBR10000-5-CLONED_CM_DETECTED: Cloned CM with MAC address 0013.7116.e726
connection attempt rejected o n Cable7/0/0 U0
The following example of the show cable modem command illustrates additional cable modem information for the above scenario involving the specified MAC addresses:
Router# scm 000f.66f9.48b1
MAC Address IP Address I/F MAC Prim RxPwr Timing Num BPI
000f.66f9.48b1 4.222.0.253 C5/0/0/U0 online(pt) 24 0.50 1045 1 Y
Router# scm 0013.7116.e726
MAC Address IP Address I/F MAC Prim RxPwr Timing Num BPI
0013.7116.e726 4.175.0.18 C7/0/0/U0 online(pt) 4 0.00 1789 0 Y
Command Reference
This section describes commands that are introduced or enhanced in Cisco IOS Release 12.3(21) BC in support of the Cloned Cable Modem Detection feature.
cable privacy bpi-plus-enforce
To mandate that a cable modem provisioned in DOCSIS 1.1 or higher must register with DOCSIS Baseline Privacy Interface Plus (BPI+), and not use the earlier DOCSIS BPI, use the cable privacy bpi-plus-enforce command in global configuration mode. To remove this configuration, use the no form of this command.
cable privacy bpi-plus-enforce
no cable privacy bpi-plus-enforce
Note
Non-DOCSIS-compliant cable modems that are commonly available contain an option to force registration in DOCSIS BPI as opposed to DOCSIS BPI+ mode even in DOCSIS 1.1-provisioned networks.
Syntax Description
No additional keywords or arguments
Defaults
The cable privacy bpi-plus-enforce command is not enabled by default, but must be configured for optimal DOCSIS BPI+ security. There is no legitimate reason for a cable modem provisioned with DOCSIS 1.1 QOS to register with DOCSIS 1.0 BPI. Such behavior is not compliant with the DOCSIS 1.1 specification.
Command Modes
Global configuration mode
Command History
Release
|
Modification
|
12.3(21)BC
|
This command was introduced to support Cloned Cable Modem Detection for DOCSIS BPI+ on the Cisco uBR10012 and Cisco uBR7246VXR routers.
|
Usage Guidelines
If the cable modem is not provisioned to use DOCSIS BPI or BPI+ security certificates, as characterized by not coming online with the above initialization states, then the existing behavior of the Cisco CMTS remains unchanged. The Cisco CMTS does not attempt to distinguish between two cable modems if neither is provisioned for BPI+ security.
Because this feature is enabled by default on the Cisco CMTS, the Cisco CMTS issues security breach notice in a log message in the generic system log or syslog if cable logging layer2events is not configured on the Cisco CMTS.
Several additional guidelines for the cable privacy bpi-plus enforce command and the Cloned Cable Modem Detection feature are described in additional sections of this document.
Examples
The following brief example illustrates logging messages that are created with the detection of cloned cable modems behind the configuration in the above procedure.
SLOT 7/0: Nov 14 12:07:26: %UBR10000-6-CMMOVED: Cable modem 0007.0e03.3e71 has been moved
from interface Cable7/0/1 to interface Cable7/0/0.
Nov 14 12:07:57: %UBR10000-5-CLONED_CM_DETECTED: Cloned CM with MAC address 0013.7116.e726
access detected at Cable7/0/0 interface
Refer to the "System Messages Supporting Cable Duplicate MAC Address Reject" section for additional illustration of this feature and supporting system log messages.
Related Commands
Command
|
Description
|
cable logging layer2events
|
Saves selected (low priority) DOCSIS events that are specified in the Cisco CMTS MIB Registry to the cable logging buffer (instead of to the general logging buffer).
|
show cable logging
|
Displays the log of messages about bad IP source addresses or DOCSIS-layer events on the cable interfaces.
|
show cable modem
|
Displays information for registered and non-registered cable modems on the Cisco CMTS.
|
Additional Information
For additional information about BPI+ security, system messages, and DOCSIS 1.1 support, refer to the following documents:
•
Theft of Service—Inevitable? Cable360.Net's article by Mark Millet of Cisco Systems, Inc.:
http://www.cable360.net/ct/data/15302.html
•
DOCSIS 1.1 for the Cisco CMTS
http://www.cisco.com/en/US/docs/cable/cmts/feature/guide/ufg_docs.html
•
Cisco Broadband Cable Command Reference Guide
http://www.cisco.com/en/US/docs/ios/cable/command/reference/cbl_book.html
•
Cisco CMTS System Messages
http://www.cisco.com/en/US/docs/cable/cmts/system/message/uberrmes.html
•
Cisco CMTS MIB Specifications Guide
http://www.cisco.com/en/US/docs/cable/cmts/mib/reference/guide/mibv5ubr.html