Release 1.0
Configuring the CMTS
526360-001-00 Rev. B
MGBI
6-93
Configuring Baseline Privacy
This section contains the tasks to configure Baseline Privacy (BPI). You must
configure BPI to encrypt upstream and downstream data on an HFC network. BPI is
activated by default and, in most cases, the BPI parameter default values are
satisfactory. The optional tasks described in this section involve some parameters you
may choose to change. If a parameter default is satisfactory, you can ignore its
associated task.
You can set the Traffic Encryption Key (TEK) and Authorization Key (AK) for BPI.
The encryption is based on 40-bit or 56-bit Data Encryption Standard (DES)
algorithms.
You can set the TEK to expire based on a grace-time value or a lifetime value. A
grace-time key assigns a temporary key to a CM to access the network. A lifetime key
assigns a more permanent key to a CM. Each CM that has an assigned lifetime key
requests a new lifetime key from the cable interface before the current key expires.
Configuring BPI involves the following tasks:
■
■
Setting Authorization Key Values
■
Displaying BPI Configuration Settings
describes the BPI parameters.
Note:
The configuration and activation of BPI depend on the cable operator
physical plant.
Table 6-12 BPI Parameters
Parameter
Identification
Default
Value
AK grace-time
Temporary AK assigned to the CM 600 seconds
300 to 1,800
seconds
AK lifetime
More permanent AK assigned to
the CM after grace-time AK
expires
604,800
seconds
1 to 6,048,000
seconds
Содержание BSR 2000
Страница 1: ...BSR 2000 Configuration and Management Guide 526360 001 00 Rev B Release 1 0 MGBI ...
Страница 6: ... Motorola Motorola Motorola Motorola Motorola Motorola Motorola Motorola Motorola ...
Страница 50: ......
Страница 130: ......
Страница 164: ......
Страница 458: ......
Страница 490: ......
Страница 580: ......
Страница 632: ......
Страница 648: ......
Страница 649: ......
Страница 650: ...526360 001 00 Rev B 7 06 MGBI Visit our website at www motorola com ...