Chapter 18: Baseline Privacy Interface (BPI)
STANDARD Revision 1.0
C4® CMTS Release 8.3 User Guide
© 2016 ARRIS Enterprises LLC. All Rights Reserved.
588
2.
The CM is granted traffic keys through the use of Traffic Encryption Key (TEK) BPKM messages.
The first message is the Key Request message.
The second message is the Key Reply message.
Reauthorization and Rekeying
The third operational step of reauthorization and rekeying is accomplished at predetermined lifetimes using the messages
in the respective sequence above.
Baseline Privacy Setup
A MIB browser or CLI commands may be used to directly configure BPI parameters. Since there are many different MIB
browsers, only the CLI commands are described.
Note: The CLI commands shown in this chapter that have a no parameter reset other parameters to their default values
when the no parameter is used.
This section describes Baseline Privacy basic setup procedures. BPI basic configuration is divided into four main topics:
1.
Initial CER Base Table Setup
2.
Configuration files
3.
Multicast
4.
Digital certificates
Initial CER Base Table Setup
(UCAM) Use the following command form for a MAC ID:
show interface cable-mac <mac> cable privacy base
Example:
show interface cable-mac 1 cable privacy base
The following sample output from this command shows the defaults: