Chapter 29: Security
STANDARD Revision 1.0
C4® CMTS Release 8.3 User Guide
© 2016 ARRIS Enterprises LLC. All Rights Reserved.
835
password used for authentication if line-based authentication is active. By default, the line password is undefined.
The configuration of login authentication, enable authentication, authorization, shell accounting, and command
accounting services are supported on a per-line basis.
By default:
There are two console lines, consoles 0 and 1. Console 0 is the new-start configuration port and is physically
secure.
There are a total of sixteen (16). Vty lines are not new-start configuration ports and are not necessarily physically
secure. They may be manually configured to work by default.
Login authentication is disabled on all lines.
Until authentication is manually configured, access to any of the configured lines is granted without challenge.
Enable authentication is disabled on all lines.
Until enable authentication is manually configured, access to enable mode on any of the configured lines is granted
without challenge.
Authorization is disabled on all lines.
Until authorization is manually configured, any command may be entered on any line without challenge. Note that this
does not include the enable command. The enable command represents a change of privilege level; therefore, it is
subject to authentication rather than authorization.
Accounting is disabled on all lines.
Until accounting is manually configured, no authentication or authorization activities may generate accounting records.
All line configuration information persist across system reboots and power-cycles.
This includes line-specific parameters (e.g., time-outs, baud rate), authentication information, authorization
information, and accounting information.
AAA Functions Supported by the C4/c CMTS
Since the C4/c CMTS does not support network-based services such as Point-to-Point Protocol (PPP) or Serial Line IP (SLIP),
only login and enable services are considered for authorization. Only command services are considered for authorization
for similar reasons.
Key capabilities include: