SB5101 Cable Modem Overview
MOTOROLA BCS
CONFIDENTIAL
Page 28 of 34
One aspect of configuration management which needs to be managed carefully is the use of
Filters and Access lists. These tables are used by the operator to determine what services their
customers and use and more importantly to block activities which the operator does not want to
allow.