1-19
Cisco uBR10012 Universal Broadband Router Software Configuration Guide
OL-1520-05
Chapter 1 Overview of Cisco uBR10012 Universal Broadband Router Software
Supported Software Features for the Cisco uBR10012 Router
DOCSIS 1.0 Feature Support
The Cisco uBR10012 router and associated Cisco IOS software support multiple DOCSIS 1.0
enhancements, extensions, and features.
•
DOCSIS 1.0 Baseline Privacy Interface
•
DOCSIS 1.0 Concatenation Override
•
DOCSIS 1.0 Configuration File Settings
•
DOCSIS 1.0 Constant Bit Rate Extension
•
DOCSIS 1.0 MAC Driver
•
DOCSIS 1.0 Quality of Service Support
•
DOCSIS 1.0 Payload Header Suppression
•
DOCSIS 1.0 per SID Bandwidth Request and Grant Counters
•
Enhanced Rate Bandwidth Allocation (ERBA) Support for DOCSIS 1.0 Cable Modems
For additional information about configuring DOCSIS QoS and other DOCSIS features, refer to the
DOCSIS 1.1 Feature Module for the Cisco uBR7200 Routers
on Cisco.com, and to other documents cited
for DOCSIS 1.0 features below.
Caution
All DOCSIS 1.0 extensions are activated only when a CM or equivalent device that supports these
extensions solicits services using dynamic MAC messages. If the CMs in your network are all
DOCSIS 1.0-based, they receive regular DOCSIS 1.0 treatment from the CMTS.
DOCSIS 1.0 Baseline Privacy Interface
The Cisco uBR10012 router supports full DOCSIS 1.0 Baseline Privacy Interface (BPI) specifications. The
BPI for DOCSIS 1.0 protects user data privacy across the shared-medium cable network and prevents
unauthorized access to DOCSIS-based data transport services across the cable network. BPI encrypts traffic
across the RF interface between the CM and CMTS, and includes authentication, authorization, and
accounting (AAA) features.
The level of data privacy is roughly equivalent to that provided by dedicated line network access services
such as analog modems or digital subscriber lines (DSL). BPI provides basic protection of service,
ensuring that a CM, uniquely identified by its MAC address, can obtain keying material for services only
when it is authorized to access them.
Note
Encryption and decryption are subject to export licensing controls.
BPI supports access control lists (ACLs), tunnels, filtering, protection against spoofing, and commands
to configure source IP filtering on RF subnets to prevent subscribers from using source IP addresses that
are not valid.