Table Of Contents
Configuring Technologies in Prime Cable Provisioning
Configuring DOCSIS
DOCSIS Workflow
DOCSIS Shared Secret
Extended CMTS MIC Shared Secret
Configuring PacketCable
PacketCable Workflows
PacketCable Basic
PacketCable Secure
Configuring PacketCable Basic
PacketCable TLV 38 and MIB Support
Configuring PacketCable Secure
Cisco Prime Cable Provisioning PacketCable Secure Provisioning Flow
Configuring SRV Records in the Network Registrar DNS Server
Configuring PacketCable 2.0
Adding a Dial Plan for PacketCable 2.0 Groovy
Configuring SNMPv3 Cloning on RDU and DPE for Secure Communication with PacketCable MTAs
Creating the Key Material and Generating the Key
Euro PacketCable
Euro-PacketCable MIBs
Configuring Euro-PacketCable MIBs
Configuring DPoE
Differences between DPoE and DOCSIS Provisioning
DPoE Workflow
Configuring CableHome
CableHome Workflow
Configuring Prime Network Registrar
Configuring RDU
Configuring CableHome WAN-MAN
Configuring CableHome WAN-Data
Configuring DPE
Configuring Technologies in Prime Cable Provisioning
This chapter describes the tasks that you must perform when configuring Prime Cable Provisioning to support specific technologies:
•
Configuring DOCSIS
•
Configuring PacketCable
•
Configuring DPoE
•
Configuring CableHome
Configuring DOCSIS
This section describes the tasks that you must perform when configuring Prime Cable Provisioning to support the DOCSIS technologies.
Note
See DOCSIS Option Support, for information on DOCSIS options supported by this Prime Cable Provisioning release.
DOCSIS Workflow
Prime Cable Provisioning supports these versions of the DOCSIS specifications: 1.0, 1.1, 2.0, and 3.0.
To successfully configure Prime Cable Provisioning for DOCSIS operations, you must configure the components as described in Chapter 6, "Configuring Prime Cable Provisioning Components", in addition to those described in this section.
Table 7-1 identifies the workflow to follow when configuring Prime Cable Provisioning to support DOCSIS.
DOCSIS Shared Secret
Prime Cable Provisioning lets you define a different DOCSIS shared secret (DSS) for each cable modem termination system (CMTS). In this way, a compromised shared secret affects only a limited number of CMTS, instead of every CMTS in the deployment.
Although the DSS can be set for each DPE, you should set it on a provisioning-group basis. Also, ensure that it matches what has been configured for the CMTS in that provisioning group.
Caution 
Configuring multiple DSS within one provisioning group could, under some conditions, result in degraded CMTS performance. However, this factor has virtually no effect on Prime Cable Provisioning.
You can enter the shared secret as a clear text string or as an IOS-encrypted string. When entered in clear text, the DSS is encrypted to suit IOS version 12.2BC.
You can also set the DSS from the RDU using the administrator user interface or the API. In this case, the DSS is entered, stored at the RDU, and passed to all DPEs in clear text. Consequently, before a DSS entered this way is stored on the DPE, it is encrypted.
If you set the DSS directly at the DPE using the dpe docsis shared-secret command from the CLI, this DSS takes precedence over the one set from the RDU.
Resetting the DOCSIS Shared Secret
You can reset the DSS if the security of the DSS is compromised or to simply change the shared secret for administrative purposes.
To reset the DSS, run the show running-config command from the CMTS CLI, then copy and paste the DOCSIS shared secret from the configuration that appears into the DPE configuration. In this way, you can copy the configuration that you enter in a Cisco CMTS into the DPE CLI.
Note
To change the shared secret as described, the CMTS must be running a software version later than version 12.2BC.
To change the DSS:
Step 1
Identify the provisioning group on which you need to reset the DOCSIS shared secret.
Step 2
Examine the list of DPEs and CMTS associated with the provisioning group.
Step 3
Change the primary DSS on the CMTS.
Step 4
Change the compromised DSS on the CMTS to the secondary DSS. This change is required to allow cable modems to continue to register until all the DOCSIS configuration files are successfully changed to use the new DSS.
Step 5
Determine which DPEs were affected and change the DSS on each accordingly.
Step 6
Confirm that the DOCSIS configuration files are using the new DSS and then remove the compromised secondary shared secret from the CMTS configuration.
Extended CMTS MIC Shared Secret
Prime Cable Provisioning lets you define a different Extended CMTS MIC (EMIC) shared secret for each cable modem termination system (CMTS) for EMIC calculation.
The CMTS must support a configuration for the shared secret for EMIC calculation to differ from the shared secret for pre-3.0 DOCSIS CMTS MIC calculation. In the absence of such configuration, the CMTS MUST use the same shared secret for Extended CMTS MIC Digest calculation as for pre-3.0 DOCSIS CMTS MIC digest calculation.
In this way, a compromised shared secret affects only a limited number of CMTS, instead of every CMTS in the deployment.
Similar to DSS, EMIC DOCSIS shared secret can be set for each DPE, you should set it on a provisioning-group basis. Also, ensure that it matches what has been configured for the CMTS in that provisioning group.
Caution 
Configuring multiple EMIC DOCSIS Shared Secret within one provisioning group could, under some conditions, result in degraded CMTS performance. However, this factor has virtually no effect on Prime Cable Provisioning.
You can enter the shared secret as a clear text string or as an IOS-encrypted string. When entered in clear text, the EMIC shared secret is encrypted to suit IOS version 12.2BC.
You can also set the EMIC Shared Secret from the RDU using the administrator user interface or the API. In this case, the DOCSIS shared secret is entered, stored at the RDU, and passed to all DPEs in clear text. Consequently, before an Extended MIC shared secret entered this way is stored on the DPE, it is encrypted.
If you set the Extended MIC shared secret directly at the DPE using the dpe docsis emic shared-secret command from the CLI, this Extended MIC shared secret takes precedence over the one set from the RDU.
Resetting the Extended EMIC Shared Secret
You can reset the Extended MIC shared secret if the security of the EMIC shared secret is compromised or to simply change the shared secret for administrative purposes.
To reset the DSS, run the show running-config command from the CMTS CLI, then copy and paste the EMIC shared secret from the configuration that appears into the DPE configuration. In this way, you can copy the configuration that you enter in a Cisco CMTS into the DPE CLI.
Note
To change the shared secret as described, the CMTS must be running a software version later than version 12.2(11)CX.
To change the Extended MIC shared secret:
Step 1
Identify the provisioning group on which you need to reset the EMIC shared secret.
Step 2
Examine the list of DPEs and CMTS associated with the provisioning group.
Step 3
Change the primary EMIC shared secret on the CMTS.
Step 4
Change the compromised EMIC shared secret on the CMTS to the secondary EMIC shared secret. This change is required to allow cable modems to continue to register until all the DOCSIS configuration files are successfully changed to use the new DSS.
Step 5
Determine which DPEs were affected and change the EMIC shared secret on each accordingly.
Step 6
Confirm that the DOCSIS configuration files are using the new EMIC shared secret and then remove the compromised secondary shared secret from the CMTS configuration.
Configuring PacketCable
This section describes the tasks that you must perform when configuring Prime Cable Provisioning to support the Packetcable technologies and bring a PacketCable voice deployment into service.
This chapter contains information on these variants of PacketCable:
•
Configuring PacketCable Basic
•
Configuring PacketCable Secure
•
Configuring PacketCable 2.0
For information that will help you solve issues in a PacketCable voice technology deployment, see Troubleshooting PacketCable eMTA Provisioning.
This chapter assumes that you are familiar with the contents of the PacketCable Multimedia Terminal Adapter (MTA) Device Provisioning Specification, PKT-SP-PROV1.5-I03-070412. For details, see the PacketCable website.
PacketCable Workflows
Prime Cable Provisioning supports these versions of the PacketCable specifications: 1.0, 1.5 and 2.0.
Prime Cable Provisioning also supports two variants of PacketCable voice services: the default Secure mode and the non-secure Basic mode. PacketCable Basic is much the same as the standard PacketCable, except for the lack of security found in the non-secure variant.
This section identifies the tasks that you must perform for each variant.
•
PacketCable Basic
•
PacketCable Secure
Note
The workflows in this section assume that you have loaded an appropriate PacketCable configuration file and the correct MIBs.
PacketCable Basic
You perform the PacketCable-related tasks described in this section only after completing those described in Chapter 6, "Configuring Prime Cable Provisioning Components".
Table 7-2 identifies the workflow to follow when configuring PacketCable Basic on Prime Cable Provisioning.
Note
Tasks marked with an asterisk (*) are mandatory.
Table 7-2 PacketCable Basic Workflow
|
Task
|
Refer to...
|
Step 1
|
Configure the DPE
|
|
a. Enable PacketCable.*
|
The service packetcable 1..1 enable command described in the Cisco Prime Cable Provisioning 5.0 DPE CLI Reference Guide
|
Step 2
|
Configure DHCP
|
|
a. Configure dynamic DNS for the MTA scopes.
|
Cisco Prime Network Registrar 8.1 User Guide
|
|
b. Configure client classes/scope-selection tags that match those added for provisioned PacketCable MTA DHCP criteria.*
|
Cisco Prime Network Registrar 8.1 User Guide
|
Step 3
|
Configure DNS
|
|
Configure dynamic DNS for each DHCP server.
|
Cisco Prime Network Registrar 8.1 User Guide
|
Step 4
|
Configure a Class of Service, which must contain the following properties:
|
|
a. /pktcbl/prov/flow/mode
This property commands the specific flow that an MTA uses. Set this property to either:
– BASIC.1—Executes the BASIC.1 flow.
– BASIC.2—Executes the BASIC.2 flow.
Note You can configure this property anywhere on the device-property hierarchy.
|
Configuring Class of Service
|
|
b. /cos/packetCableMTA/file
This property contains the name of the configuration file that is to be presented to the MTA. The configuration file is stored as a file in Prime Cable Provisioning.
The configuration file presented to a Basic MTA must contain the Basic integrity hash. If you are using a dynamic configuration template, the hash is inserted transparently during template processing. You can use the dynamic template for provisioning in both Secure and Basic modes.
However, if the file is a Secure static configuration file, you must convert this file to a Basic static configuration file because Secure and Basic static configuration files are not interoperable. For details on how to perform this conversion, see Activating PacketCable Basic Flow.
|
Configuring Class of Service
|
PacketCable Secure
Prime Cable Provisioning supports two variants of PacketCable Secure:
•
North American PacketCable
•
European PacketCable
Euro-PacketCable services are the European equivalent of the North American PacketCable standard. The only significant difference between the two is that Euro PacketCable uses different MIBs. For details, see Euro-PacketCable MIBs.
You perform the PacketCable-related tasks described in this section only after configuring the components as explained in Chapter 6, "Configuring Prime Cable Provisioning Components".
Note
For PacketCable-compliant operations, the maximum allowable clock skew between the MTA, KDC, and DPE is 300 seconds (5 minutes). This value is the default setting.
Table 7-3 identifies the workflow to follow when configuring Prime Cable Provisioning to support PacketCable Secure.
Note
Tasks marked with an asterisk (*) are mandatory.
Configuring PacketCable Basic
Prime Cable Provisioning also supports PacketCable Basic, which offers a simpler, DOCSIS-like, non-secure provisioning flow. Table 7-4 describes the BASIC.1 flow using the provisioning workflow in Figure 7-1.
Table 7-4 PacketCable Basic eMTA Provisioning
Step
|
Workflow
|
Description
|
MTA-1
|
DHCP Broadcast Discover
|
Executes as for the Secure flow.
|
MTA-2
|
DHCP Offer
|
If the provisioning system is configured to provision the MTA in BASIC.1 mode, the provisioning system returns a DHCP Offer containing Option 122 suboption 6, which contains the special reserved realm name "BASIC.1". This reserved realm name commands the MTA to use the BASIC.1 provisioning flow. This Offer also contains the provisioning system IP address in Option 122.3, and the file and siaddr fields are populated with the configuration file location of the MTA.
|
MTA-3
|
DHCP Request
|
The remainder of the MTA DHCP exchange is executed (Request and Ack exchanged).
|
MTA-4
|
DHCP Ack
|
MTA-22
|
Telephony Config File Request
|
The MTA skips directly to step MTA-22. Using the file and siaddr information, the MTA copies its configuration file from the provisioning system via TFTP. Note that Prime Cable Provisioning integrates the TFTP server into the DPE component.
Note No authentication of MTA/provisioning server or encryption occurs.
|
MTA-23
|
Telephony Config File
|
The BASIC.2 flow is identical to BASIC.1, with the following exceptions:
•
"BASIC.2" is populated into the MTA's DHCP Option 122 suboption 6.
•
The MTA issues a provisioning status SNMPv2c INFORM at the very end of the flow, MTA-25 (DHCP Option 122 suboption 3 specifies the Inform target).
The PacketCable Basic flow is similar to the DOCSIS flow with the following differences:
•
There is no ToD exchange between MTA and the provisioning system.
•
The MTA configuration file contains an integrity hash. Specifically, the SHA1 hash of the entire content of the configuration file is populated into a pktcMtadevConfigFileHash SNMP VarBind and placed within a TLV 11 just before the end of file TLV.
•
BASIC.2 flow issues a provisioning status SNMPv2c Inform after the MTA receives and processes its configuration file. This Inform notifies Prime Cable Provisioning if MTA provisioning completed successfully. If there is a problem, an error is generated and an event sent from the DPE to the RDU, then on to a Prime Cable Provisioning client. This Inform is useful while debugging configuration file issues.
For additional information about the DOCSIS flow, see Chapter 7 "Configuring Technologies in Prime Cable Provisioning."
Note
Before using the PacketCable Basic provisioning flow, ensure that you are using a PacketCable Basic-capable eMTA. The eMTA must report that it is Basic-capable with its DHCP Discover Option 60, TLV 5.18 (supported flows).
PacketCable TLV 38 and MIB Support
Prime Cable Provisioning supports the complete set of PacketCable 1.5 MIBs.
Prime Cable Provisioning supports TLV 38 in PacketCable configuration templates. This TLV lets you configure multiple SNMP notification targets. Configuration of this TLV means that all notifications are also issued to the targets configured through TLV 38.
SNMP v2C Notifications
Prime Cable Provisioning supports both SNMP v2C TRAP and INFORM notifications from the PacketCable MTA.
Configuring PacketCable Secure
This section deals exclusively with Secure PacketCable voice provisioning. PacketCable Secure is designed to minimize the possibility of theft of telephony service, malicious disruption of service, and so on. PacketCable Secure depends on the Kerberos infrastructure to mutually authenticate the MTA and the provisioning system; in Prime Cable Provisioning, the Key Distribution Center (KDC) functions as the Kerberos server. SNMPv3 is also used to secure the conversation between the MTA and the provisioning system.
Cisco Prime Cable Provisioning PacketCable Secure Provisioning Flow
All PacketCable provisioning flows are defined as a sequence of steps.
Figure 7-1 illustrates the Secure provisioning flow for PacketCable eMTAs.
Figure 7-1 Embedded-MTA Secure Power-On Provisioning Flow
Note
It is strongly recommended that you use a protocol analyzer (protocol sniffer) with the ability to capture data packets to understand exactly which step is failing.
In addition, the content of the KDC log file is critical to understanding the root cause of any KDC failure.
When diagnosing problems in provisioning an embedded Multimedia Terminal Adapters (eMTA), the flow description in Table 7-5 helps identify which step in the PacketCable provisioning flow is failing.
Table 7-5 PacketCable Secure eMTA Provisioning
Step
|
Workflow
|
Description
|
CM-1
|
DHCP Broadcast Discover
|
This is similar to the DOCSIS cable modem (CM) boot flow for DHCPv4 or DHCPv6 with DHCP options added to provide the MTA with a list of PacketCable DHCP servers from which the MTA is allowed to accept DHCP offers.
|
CM-2
|
DHCP Offer
|
CM-3
|
DHCP Request
|
CM-4
|
DHCP Ack
|
CM-5
|
DOCSIS 1.1 CM Config File Request
|
CM-6
|
DOCSIS 1.1 Config File
|
CM-7
|
ToD Request
|
CM-8
|
ToD Response
|
CM-9
|
CM Registration with CMTS (cable modem termination system)
|
CM-10
|
CMTS Registration Ack
|
MTA-1
|
DHCP Broadcast Discover
|
Using DHCP, the MTA announces itself as a PacketCable MTA and provides information on the capabilities and provisioning flows it supports (Secure, Basic, and so on.). The MTA also obtains addressing information and DHCP Option 122. DHCP Option 122 contains the PacketCable provisioning server address and the security realm name. This information is used to allow the MTA to contact the KDC and provisioning server.
Some key troubleshooting hints are:
• Check the DHCP relay agent on the CMTS for the correct configuration; ensure that your CMTS points to the correct DHCP server.
• Verify that you have the correct routing between the MTA, CMTS, DHCP server, and the DPE.
• Verify that secondary subnets are configured correctly on the CMTS.
• Check the Cisco Prime Network Registrar DHCP configuration. Verify if the scopes are configured, if IP addresses are available, and if all secondary subnets are configured.
• Check the Prime Cable Provisioning configuration. Check the cnr_ep.properties file and ensure that the required PacketCable Network Registrar extension properties are configured. For more information, see Mapping PacketCable DHCP Options to Prime Cable Provisioning Properties.
If a packet trace reveals that the MTA is cycling between steps MTA-1 and MTA-2, there could be a problem with the configuration of DHCP Option 122 (realm name or provisioning server FQDN suboptions), DHCP Option 12 (hostname), or DHCP Option 15 (domain name).
|
MTA-2
|
DHCP Offer
|
MTA-3
|
DHCP Request
|
MTA-4
|
DHCP Ack
|
MTA-5
|
DNS Request
|
MTA uses the security realm name (delivered within DHCP Option 122) to perform a DNS SRV lookup on the KDC service and then resolves the KDC IP address.
Some key troubleshooting hints are:
• Use a packet sniffer to watch for misdirected or malformed DNS packets sent to the Network Registrar DNS.
• Set the Network Registrar DNS log level to detailed packet tracing and verify what arrives there.
• Check the DNS configuration—The DNS server specified in cnr_ep.properties must contain the realm zone, the SRV record, and the DNS `A' record for the KDC.
|
MTA-6
|
DNS Srv
|
MTA-7
|
DNS Request
|
MTA-8
|
DNS Response
|
MTA-9
|
AS Request
|
The AS-REQ request message is used by the KDC to authenticate the MTA.
Some key troubleshooting hints are:
• Check the KDC log file to determine if the AS-REQ arrives and to observe any errors or warnings.
• Check that the KDC is configured with the correct MTA_Root certificate. The Manufacturer and Device certificates sent by the MTA within the AS-REQ message must chain with the MTA_Root certificate installed at the KDC.
|
MTA-9a
|
MTA FQDN Request
|
The KDC extracts the MTA MAC address from the MTA certificate and sends it to the provisioning server for validation. If the provisioning server has the FQDN for that MAC address, it is returned to the KDC. The KDC then compares the FQDN received from the MTA to the FQDN received in the FQDN-REP reply message.
Some key troubleshooting hints are:
• Use a packet sniffer to watch for misdirected or malformed DNS packets. The MTA passes the provisioning server FQDN (which the MTA received in DHCP Option 122) within the AS-REP message to the KDC. The KDC then uses this FQDN to resolve the IP address of the provisioning server.
• Check the filenames and content of the KDC key file; the KDC service key in the DPE must match the service key at the KDC. The names of the service key files at the KDC are critical.
|
MTA-9b
|
MTA FQDN Reply
|
MTA-10
|
AS Reply (AS-REP)
|
The KDC grants a provisioning service ticket to the MTA and also sends the Service Provider, Local System Provider (optional), and KDC certificate to the MTA. The MTA then verifies if the certificates sent by the KDC chain to the Service Provider Root certificate stored in the MTA. If these certificates do not chain, the MTA loops back to step MTA-1 of the provisioning flow. See Using PKCert.sh, page 28-3, for additional information on the KDC.cer file.
A key troubleshooting hint: Verify if the KDC log files show that the AS-REP message was sent to the device. If a packet trace reveals the MTA is cycling between steps MTA-1 and MTA-10, there is a problem with the service provider certificate chain.
|
MTA-11
|
TGS Request
|
The MTA receives either a service ticket or a ticket-granting-ticket (TGT) following step MTA-10. If the MTA had obtained a TGT instead of a service ticket in step MTA-10, it contacts the ticket-granting-server (KDC) to obtain a service ticket.
|
MTA-12
|
TGS Reply
|
The KDC sends a service ticket in the TGS Reply to the MTA.
|
MTA-13
|
AP Request (AP-REQ)
|
The MTA presents the ticket (received at step MTA-10) to the provisioning server specified by DHCP Option 122.
|
MTA-14
|
AP Reply (AP-REP)
|
The provisioning server uses the KDC shared secret to decrypt the AP-REQ, validates the provisioning server ticket presented by the MTA, and sends AP-REP with SNMPv3 keys. SNMPv3 is now authenticated and (optionally) encrypted.
|
MTA-15
|
SNMP Inform
|
The MTA signals to the provisioning server that it is ready to receive provisioning information.
|
MTA-16
|
SNMP Get Request
|
SNMPv3—If the provisioning server (DPE) requires additional device capabilities, it sends the MTA one or more SNMPv3 Get requests to obtain the required information on MTA capability. The provisioning server (DPE) may use a GetBulk request to request a bulk of information in a single message.
|
MTA-17
|
SNMP Get Response
|
SNMPv3—The MTA sends to the provisioning server (DPE) a response for each GetRequest that contains information on MTA capabilities requested in step MTA-16.
|
MTA-18
|
MTA Config file
|
Using information made available in steps MTA-16 and MTA-17, the provisioning server (DPE) determines the contents of the MTA configuration data file.
|
MTA-19
|
SNMP Set
|
SNMPv3—The provisioning server performs an SNMPv3 Set to the MTA containing the URL for the MTA configuration file, encryption key for the file, and the file hash value.
|
MTA-20
|
Resolve TFTP Server FQDN
|
DNS Request—If the URL-encoded access method contains an FQDN instead of an IPv4 address, the MTA uses the DNS server of the service provider network to resolve the FQDN into an IPv4 address of the TFTP server or the HTTP server.
|
MTA-21
|
TFTP Server IP Address
|
DNS Response—The DNS server returns the IPv4 IP address of the service provider network as requested in step MTA-20.
|
MTA-22
|
Telephony Config File Request
|
The MTA proceeds to download the VoIP configuration file from the specified TFTP server. Note that Prime Cable Provisioning integrates the TFTP server into the DPE component.
|
MTA-23
|
Telephony Config File
|
MTA-24
|
MTA Send
|
The MTA optionally sends a syslog notification to the service provider that provisioning is complete.
|
MTA-25
|
Notify completion of telephony provisioning
|
The MTA signals to the provisioning server if the new configuration is acceptable.
|
SEC-1 to SEC-10
|
These steps are the post-MTA provisioning security flow and are not applicable to Prime Cable Provisioning provisioning. This flow involves getting Kerberos tickets associated with each CMS with which the MTA communicates. For details, see the PacketCable Security Specifications.
|
Configuring SRV Records in the Network Registrar DNS Server
You must configure the Network Registrar DNS server to operate with the KDC. To set up this configuration, see your Network Registrar documentation and these instructions.
Note
We recommend that you create a zone name that matches the desired realm name, and that the only DNS record in this special zone (other than the records required by the DNS server to maintain the zone) should be the SRV record for the realm. This example assumes that the desired Kerberos realm is voice.example.com, and that all other KDC, Network Registrar, and DPE configurations have been performed. The FQDN of the KDC is assumed to be kdc.example.com.
Step 1
Start the nrcmd command-line tool (which resides, by default, in the /opt/nwreg2/local/usrbin directory).
Step 2
Enter your username and password.
Step 3
To create a zone for the Kerberos realm, enter:
nrcmd>
zone voice.example.com create primary address_of_nameserver hostmaster
where address_of_nameserver specifies the IP address of the name server.
Step 4
To add the SRV record to the new zone, enter:
nrcmd>
zone voice.example.com. addRR _kerberos._udp. srv 0 0 88 KDC_FQDN
where KDC_FQDN specifies the FQDN of the KDC.
Step 5
To save and reload the DNS server, enter:
nrcmd>
save
nrcmd>
dns reload
Configuring PacketCable 2.0
PacketCable 2.0 supports the convergence of voice, video, data, and mobility technologies. It is based on Session Initiation Protocol (SIP) and IP multimedia system (IMS) and supports configuration and management of Non-Embedded User Equipment (UE) as well as Embedded User Equipment (E-UE).
Prime Cable Provisioning supports only the UEs that are embedded with a DOCSIS Cable Modem and are called as E-UE or Embedded Digital Voice Adapter (E-DVA). E-DVA supports RST (Residential SIP Telephony.
Note
Prime Cable Provisioning supports E-DVA provisioning only in IPv4 but both in Basic and Secure modes.
Adding a Dial Plan for PacketCable 2.0 Groovy
A dial plan is provisioned on the UE to inform the UE about how dialed digits should be interpreted. A dial plan is an ordered set of regular expressions combined with some special tokens that represent actions to be carried out by the UE when a regular expression is matched.
The dial plan is organized into a list of rules. The UE must apply the dial plan rules sequentially and upon matching a pattern, including timers, the UE must perform the specified action or actions.
To create a dial plan you must be familiar with the notation and content of Augmented Backus-Naur Form (ABNF) defined in RFC 4234. Below is a sample dial plan that you can use as a reference.
Note
If any issues are encountered while determining the device capabilities, Prime Cable Provisioning defaults to the Secure mode. While adding a dial plan, you can either use a groovy script or a binary file but not a template.
A sample groovy file to create a dial plan
domain = "@ims.packetcable.com"
dialString = ";user=dialstring"
dialPhone = ";user=phone"
homeEmergencyNumber = "911"
localEmergencyNumber = "911"
"(=Emergency)" : EMERGENCY-CALL("sip:" "911" =domain =dialPhone)
"(=N11)" : MAKE-CALL("sip:" #1v =domain =dialString)
"(=SpeedDial)" : MAKE-CALL("sip:" #1v =domain =dialString)
"(=PhoneNumber)" : MAKE-CALL("sip:" #1v =domain =dialPhone)
"(=ImmediateVSCs)" : RETURN
"(=DelayedVSCs)" : RETURN
"(x{1-20})S" : MAKE-CALL("sip:" #1 =domain =dialPhone)
"(x{1-20})#" : MAKE-CALL("sip:" #1 =domain =dialPhone)
* PKTC-IETF-MTA-MIB pktcMtaDevEnabled (1.3.6.1.2.1.140.1.1.6.0)
configFile.add(TLV_SNMP("1.3.6.1.2.1.140.1.1.6.0", "Integer", "1"))
* Device Level Configuration (Secure flow only):
* Include required Secure-flow realm TLVs
if (isSecureProvFlowMode)
// PKTC-IETF-MTA-MIB pktcMtaDevRealmName.1 (1.3.6.1.2.1.140.1.3.6.1.2.1)
TLV_SNMP("1.3.6.1.2.1.140.1.3.6.1.2.1", "STRING", realmName))
// PKTC-IETF-MTA-MIB pktcMtaDevRealmOrgName.1 (1.3.6.1.2.1.140.1.3.6.1.5.1)
TLV_SNMP("1.3.6.1.2.1.140.1.3.6.1.5.1", "STRING", realmOrgName))
configFile.add(option.createOptionValue(OptionSyntax.SNMP,"64",[".pktcEUERSTDMValue.1","ST
RING",dialPlan]));
Note
The sample PacketCable 2.0 groovy script (example_edva.groovy) uses numeric OIDs for the PacketCable Secure-mode SNMP TLVs (pktcMtaDevRealmName, pktcMtaDevRealmOrgName).
If the TLV length of Option 64 exceeds 4500, you must update the property /default/asnParser/bufferLength=20000 in /opt/CSCObac/api/conf/api.properties and in /opt/CSCObac/rdu/conf/rdu.properties.
Configuring SNMPv3 Cloning on RDU and DPE for Secure Communication with PacketCable MTAs
Prime Cable Provisioning lets you enable an external network manager for SNMPv3 access to MTA devices. Additionally, the RDU is capable of performing SNMPv3 operations in a specific MTA.
To enable this capability, set the security key material at the DPEs and RDU. After the key material has been set, the Prime Cable Provisioning application programming interface (API) calls that are used to create cloned SNMPv3 entries are enabled.
Note
Enabling this capability impacts provisioning performance.
Creating the Key Material and Generating the Key
Creating the key material is a two-step process:
1.
Run a script command on the RDU.
2.
Run a CLI command on the DPE.
Note
This shared secret is not the same shared secret as the CMTS or the Prime Cable Provisioning shared secrets.
To create the key material:
Step 1
From the BPR_HOME/rdu/bin directory, run this script on the RDU:
#
generateSharedSecret.sh password
where password is any password, from 6 to 20 characters, that you create. This password is then used to generate a 46-byte key. This key is stored in a file, called keymaterial.txt, that resides in the BPR_HOME/rdu/conf directory.
Step 2
Run the service packetcable 1..1 snmp key-material DPE CLI command, with the password used in Step 1 to generate that key, on all DPEs for which this voice technology is enabled. This command generates the same 46-byte key on the DPE and ensures that the RDU and DPEs are synchronized and can communicate with the MTA securely.
Euro PacketCable
Euro-PacketCable services are essentially the European equivalent of North American PacketCable services with the following differences:
•
Euro PacketCable uses different MIBs.
•
Euro PacketCable uses a different set of device certificates (MTA_Root.cer) and service provider certificates (Service Provider Root).
For Euro-PacketCable certificates, the kdc.ini file must have the euro-packetcable property set to true. The KDC supports Euro-PacketCable (tComLabs) certificate chains. The following is a sample Euro PacketCable-enabled KDC configuration file.
interface address = 10.10.10.1
FQDN = servername.cisco.com
maximum log file size = 10000
log debug level = 5 minimum
When using Euro PacketCable, ensure that the value of the PacketCable property /pktcbl/prov/locale is set to EURO. The default is NA (for North America). You can specify the locale in the Configuration File utility. See Using Configuration File Utility for Template, for more information.
Euro-PacketCable MIBs
Euro-PacketCable MIBs are essentially snapshots of draft-IETF MIBs. MTA configuration files consist of SNMP VarBinds that reference the MIBs. There are substantial differences between the North American PacketCable and Euro-PacketCable MIBs; therefore, the North American PacketCable and Euro-PacketCable configuration files are incompatible. During installation, sample files for North American PacketCable (cw29_config.tmpl) and Euro PacketCable (ecw15_mta_config.tmpl) are copied to the BPR_HOME/rdu/samples directory.
Prime Cable Provisioning ships with the following Euro-PacketCable MIBs:
•
DOCS-IETF-BPI2-MIB
•
INTEGRATED-SERVICES-MIB
•
DIFFSERV-DSCP-TC
•
DIFFSERV-MIB
•
TCOMLABS-MIB
•
PKTC-TCOMLABS-MTA-MIB
•
PKTC-TCOMLABS-SIG-MIB
Configuring Euro-PacketCable MIBs
To configure Prime Cable Provisioning to use Euro-PacketCable MIBs, you must change the Prime Cable Provisioning RDU property that specifies the MIBs to be loaded. By default, this property contains the PacketCable MIBs.
You can change the property in one of the following ways:
•
Modify rdu.properties and restart the RDU.
•
On the administrator user interface, navigate to Configuration > Defaults > System Defaults and replace the MIB list with the list shown below. You do not need to restart the RDU.
•
Use the Prov API changeSystemDefaults() call. You do not need to restart the RDU.
The property name is /snmp/mibs/mibList (properties file) or SNMPPropertyKeys.MIB_LIST
(the Prov API constant name). The property value is a comma-separated value (CSV) consisting of the required MIB names, as shown:
/snmp/mibs/mibList=SNMPv2-SMI,SNMPv2-TC,INET-ADDRESS-MIB,CISCO-SMI,CISCO-TC,SNMPv2-MIB,RFC
1213-MIB,IANAifType-MIB,IF-MIB,DOCS-IF-MIB,DOCS-IF-EXT-MIB,DOCS-BPI-MIB,CISCO-CABLE-SPECTR
UM-MIB,CISCO-DOCS-EXT-MIB,SNMP-FRAMEWORK-MIB,DOCS-CABLE-DEVICE-MIB,DOCS-QOS-MIB,CISCO-CABL
E-MODEM-MIB,DOCS-IETF-BPI2-MIB,INTEGRATED-SERVICES-MIB,DIFFSERV-DSCP-TC,DIFFSERV-MIB,TCOML
ABS-MIB,PKTC-TCOMLABS-MTA-MIB,PKTC-TCOMLABS-SIG-MIB
Configuring DPoE
The DOCSIS Provisioning of Ethernet Passive Optical Network (DPoE) 1.0 is a standard for provisioning EPON access technology using the existing DOCSIS provisioning flow. DPoE network offers IP high speed data services equivalent to DOCSIS networks, where the DPoE network acts like a DOCSIS CMTS. The DPoE system and DPoE Optical Network Unit appear to act like a DOCSIS CM also known as virtual CM(vCM). Prime Cable Provisioning uses the existing DOCSIS device type for DPoE vCM devices. DPoE configuration files contain a mixture of DOCSIS and DPoE-specific TLVs.
To identify a DPoE vCM, refer to the DHCP discover data captured under Request Dictionary displayed under Device Details page. Details similar to the following example show up and if the text in bold appear in page, then it is DPoE vCM.
Example:
v-i-vendor-opts = enterprise-id 4491, (oro 1 2)
chaddr = 00:00:00:00:0d:12
relay-agent-info = (circuit-id 1 80:01:03:ef), (remote-id 2 00:00:00:00:0d:12),
(v-i-vendor
-opts 9 enterprise-id 4491, (cmts-capabilities 1 (docsis-version 1 03:00
), (dpoe-system-version 1 01:00), (dpoe-system-pbb 4 10248294639d, 1a9eb
ee4971b, 26d07cd85ab2, 33800cf1abbb, 3b87c25dffbb, 47bd40a08f95, 4fc50b5
3a070, 5768bd554059, 591cf857aea1, 638c2d178f8f, 6d932a665ec9, 74efc6fc0
relay-agent-circuit-id = 01:04:80:01:03:ef
client-id-created-from-mac-address = 0
dhcp-class-identifier = AIC Echo,docsis3.0:
vendor-encapsulated-options = (device-serial-number 4 000000000d12),
(hardware-version-number 5 v3.2.1
), (software-version-number 6 v1.0.2), (boot-rom-version 7 BOOT1.0), (ve
ndor-oui 8 000000), (vendor-name 10 XEROX CORPORATION), (dpoe-embedded-c
dhcp-parameter-request-list = {1,3,6,7,12,15,51,54,4,2,67,66}
client-id = ff:00:00:00:00:00:03:00:01:00:00:00:00:0d:12
Sample DPoE Configuration file
The sample DPoE configuration files are available under the installed package at location:
•
Static file: dpoe_vcm.cm -- /opt/CSCObac/rdu/samples/docsis
•
Groovy file: example_dpoe_vcm.groovy -- /opt/CSCObac/rdu/samples/groovy
•
Template file: dpoe_vcm.tmpl -- /opt/CSCObac/rdu/templates
Note
Prime Cable Provisioning supports provisioning of DPoE vCMs in IPv4 mode only. Also, only downstream of computer devices from a DPoE vCMs is supported.
See DPoE Option Support for the DPoE TLVs.
Differences between DPoE and DOCSIS Provisioning
The provisioning of a DPoE vCM is nearly identical to the provisioning of DOCSIS CM. This allows existing DOCSIS-based back-office systems (such as provisioning servers) to support DPoE vCM provisioning with minimal changes. However, there are minor differences between DPoE vCM and DOCSIS CM provisioning:
•
The DPoE specifications do not support IPv6 or PacketCable Voice services. Only IP (HSD) and MEF services are supported.
•
The DPoE System (CMTS) supplies additional relay agent DHCP options. The DHCPv4 Relay Agent CMTS capabilities option contains additional sub-options (sub-option 2: DPoE System Version Number and sub-option 4: DPoE System DHCPv4 PBB service option).
•
The DPoE vCM does not request ToD. The DPoE System (CMTS) supplies the time reference directly to the vCM.
•
The DPoE vCM uses the same DHCPv4 option-60 value as DOCSIS 3.0 CM (i.e., docsis3.0). By itself, the DHCPv4 option-60 value is not sufficient to identify the device as a DPoE vCM.
•
The DPoE vCM uses a new eSAFE DHCP option-43 sub-option 55 for specifying the list of eSAFE devices behind the eCM.
•
The DPoE vCM supports new configuration file TLVs not supported by DOCSIS 3.0 MULPI (i.e., TLVs [22/23].14, [22/23].14.1, [22/23].14.2, [22/23].14.5, [22/23].14.6, [22/23].15, [22/23].15.1, [22/23].15.2).
•
The DPoE vCM does not require or support all configuration file TLVs required by DOCSIS 3.0 MULPI. When the DPoE system encounters a TLV that is not supported, then the DPoE system ignores the TLV and allow the DPoE ONU to register normally.
DPoE Workflow
DPoE workflow is same as DOCSIS workflow. See DOCSIS Workflow for details.
Configuring CableHome
This section describes the activities that must be performed to ensure a satisfactory CableHome deployment. There are two versions of the CableHome technology: secure (SNMP) and non-secure (DHCP). This chapter deals exclusively with the non-secure version.
This section assumes that you are familiar with the contents of the CableHome Specification CH-SP-CH1.0-I05-030801.
CableHome Workflow
To successfully configure Prime Cable Provisioning for provisioning using the non-secure CableHome technology, you must perform the tasks described in Chapter 6, "Configuring Prime Cable Provisioning Components", in addition to those described in this section.
Table 7-6 describes the tasks you must perform on Prime Cable Provisioning to support CableHome.
Table 7-6 CableHome Workflow
|
Task
|
Refer to...
|
Step 1
|
Configure the RDU
|
|
a. Configure provisioned DHCP Criteria.
Add all the DHCP Criteria that will be used by the non-secure CableHome devices that you will provision.
|
Configuring DHCP Criteria
|
|
b. Configure provisioned Class of Service.
Add the Class of Service that may be used by any provisioned non-secure CableHome device.
|
Configuring Class of Service
|
|
c. Configure the promiscuous mode of operation.
|
System Defaults
|
Step 2
|
Configure the DPE
|
Step 3
|
Configure Network Registrar
|
|
Configure the client classes/scope-selection tags to match those added for the provisioned non-secure CableHome DHCP Criteria.
|
Cisco Prime Network Registrar 8.1 User Guide
|
Configuring Prime Network Registrar
This section describes how to configure Prime Network Registrar, the cable modem configuration system (CMTS).
Step 1
Create selection tags for provisioned and unprovisioned WAN-MAN and also for provisioned WAN-Data.
Configure unprovisioned and provisioned client classes and scopes for cable modems, as specified in Cisco Prime Network Registrar 8.1 User Guide.
Step 2
Configure unprovisioned and provisioned client classes and scopes for WAN-MAN.
Step 3
Configure provisioned client classes and scopes for WAN-Data.
Step 4
Add routes to all the subnets.
Configuring RDU
To configure CableHome support on the RDU, perform these configurations:
•
Configuring CableHome WAN-MAN
•
Configuring CableHome WAN-Data
Configuring CableHome WAN-MAN
1.
Create a DHCP Criteria for the provisioned WAN-MAN. To do this, set the client class to a client-class name that is configured in the Network Registrar CableHome WAN-MAN.
2.
Create a Class of Service for the provisioned WAN-MAN.
–
Set the /cos/chWanMan/file to a CableHome configuration file appropriate for the Class of Service.
–
Set the /chWanMan/firewall/file to the desired firewall configuration file.
Configuring CableHome WAN-Data
Configure these WAN-Data parameters whenever you want portal services to obtain the WAN-Data IP addresses:
1.
Create DHCP Criteria for WAN-Data.
2.
Create Class of Service for WAN-Data.
Configuring DPE
To configure the DPE to support the CableHome technology:
Step 1
Open the CableHome device provisioning WAN-MAN config file and verify that DHCP Option 60 is set to either CableHome1.0 or CableHome1.1. Some manufacturers use a proprietary MIB object to instruct a device to behave as a pure cable modem, a non-CableHome router, or a CableHome router. The device appears as a Computer whenever the device DHCP packet does not contain CableHome1.0 or CableHome1.1 in the DHCP Option 60.
Step 2
If you want the portal services to obtain IP addresses for WAN-Data:
•
Ensure that the WAN-MAN configuration file contains TLV 28 that sets cabhCdpWanDataIpAddrCount to a value that is greater than 0.
•
In the cable modem configuration file, set the maximum number of devices to include the number of WAN-Data IP addresses.
Step 3
To enable self-provisioning when the CableHome device boots:
•
In the unprov-wan-man.cfg portal services configuration file, set the portal services in the passthrough mode.
•
In the cable modem configuration file, set the maximum number of devices to at least 2 to allow provisioning of the WAN-MAN and a computer. The computer can directly access sign-up web pages to be self-provisioned.