PacketCable MTA Device Provisioning Specification PKT-SP-PROV-I Interim. Notice
|
|
|
- Isabel Merritt
- 9 years ago
- Views:
Transcription
1 PacketCable MTA Device Provisioning Specification Interim Notice This PacketCable specification is a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. (CableLabs ) for the benefit of the cable industry. Neither CableLabs, nor any other entity participating in the creation of this document, is responsible for any liability of any nature whatsoever resulting from or arising out of use or reliance upon this document by any party. This document is furnished on an AS-IS basis and neither CableLabs, nor other participating entity, provides any representation or warranty, express or implied, regarding its accuracy, completeness, or fitness for a particular purpose. Copyright 1999 Cable Television Laboratories, Inc. All rights reserved.
2 PacketCable MTA Device Provisioning Specification Document Status Sheet Document Control Number: Document Title: Revision History: PacketCable MTA Device Provisioning Specification I : release Date: December 1, 1999 Status: Work in Progress Draft Interim Released Distribution Restrictions: Author Only CL/Member CL/ PacketCable/ Vendor Public Key to Document Status Codes: Work in Progress Draft Interim Released An incomplete document designed to guide discussion and generate feedback that may include several alternative requirements for consideration. A document in specification format considered largely complete, but lacking reviews by Members and vendors. Drafts are susceptible to substantial change during the review process. A document which has undergone rigorous Member and vendor review, suitable for use by vendors to design in conformance to and for field testing. For purposes of the Contribution and License Agreement for Intellectual Property" which grants licenses to the intellectual property contained in the PacketCable Specification, an "Interim Specification" is a "Published Specification. A stable document, reviewed, tested and validated, suitable to enable cross-vendor interoperability. ii CableLabs 12/01/99
3 PacketCable MTA Device Provisioning Specification Contents INTRODUCTION Purpose Scope Document Overview Requirements Syntax BACKGROUND Service Goals Specification Goals PacketCable Reference Architecture Components and Interfaces MTA Provisioning Server Telephony Syslog Server MTA to DHCP Server MTA to Provisioning Application MTA to CMS MTA to Security Server (TGS) MTA and Configuration Data File Access DOCSIS extensions for MTA Provisioning PROVISIONING OVERVIEW Device Provisioning Endpoint Provisioning Provisioning State Transitions PROVISIONING FLOWS Backoff, Retries, and Timeouts Embedded-MTA Power-On Initialization Flows Post Initialization Incremental Provisioning Synchronization of Provisioning Attributes with Configuration File Enabling Services on an MTA Endpoint Disabling Services on an MTA Endpoint Modifying Services on an MTA Endpoint MTA Replacement Temporary Signal Loss DHCP OPTIONS Code 177: PacketCable Servers Option Service Provider s DHCP Server Address (sub-option 1) /01/99 CableLabs iii
4 PacketCable MTA Device Provisioning Specification Service Provider s SNMP Entity Address (sub-option 2) DNS system (sub-option 3 and sub-option 4) Code 60: Vendor Client Identifier MTA PROVISIONABLE ATTRIBUTES MTA Configuration File Name MTA Configuration File Device Level Configuration Data Device Level Service Data Per-Endpoint Configuration Data MTA DEVICE CAPABILITIES...36 APPENDIX A. ACKNOWLEDGEMENTS...37 APPENDIX B. REFERENCES AND BIBLIOGRAPHY...38 APPENDIX C. GLOSSARY...40 APPENDIX D. REVISIONS...50 iv CableLabs 12/01/99
5 PacketCable MTA Device Provisioning Specification Figures Figure 1. Transparent IP Traffic Through the Data-Over-Cable System... 3 Figure 2: PacketCable 1.0 Network Component Reference Model (partial)... 5 Figure 3: PacketCable Provisioning Interfaces... 6 Figure 4. Device States and State Transitions...11 Figure 5. Embedded-MTA Power-on Initialization Flow /01/99 CableLabs v
6 PacketCable MTA Device Provisioning Specification This page intentionally left blank. vi CableLabs 12/01/99
7 PacketCable MTA Device Provisioning Specification INTRODUCTION 1.1 Purpose This specification describes the PacketCable 1.0 embedded-mta device initialization and provisioning. This specification is being issued to facilitate design and field-testing leading to the early manufacturability and interoperability of conforming hardware and software by multiple vendors. 1.2 Scope The scope of this document is limited to the provisioning of a PacketCable 1.0 embedded-mta device by a single provisioning and network management provider. An attempt has been made to provide enough detail to enable vendors to build an embedded-mta device that is interoperable in a PacketCable 1.0 network configuration. 1.3 Document Overvie w This specification describes provisioning of a PacketCable 1.0 embedded-mta. The document is structured as follows: Section 2 Background information including a description of the provisioning reference architecture, components and interfaces. Section 3 Provisioning overview including logical state transition diagram. Section 4 Provisioning flows for initial power-on, post-power-on, scenarios involving updating services on an MTA endpoint, and limited failure scenarios. Section 5 PacketCable requirements for DHCP [1] option code 60 and option code 177. Section 6 MTA configuration file Section 7 - List of MTA device capabilities. 1.4 Requirements Syn tax Throughout this document, words used to define the significance of particular requirements are capitalized. These words are: MUST : This word or the adjective REQUIRED means that the item is an absolute requirement of this specification. MUST NOT : This phrase means that the item is an absolute prohibition of this specification. SHOULD : This word or the adjective RECOMMENDED means that there may exist valid reasons in particular circumstances to ignore this item, but the full 12/01/99 CableLabs 1
8 PacketCable MTA Device Provisioning Specification implications should be understood and the case carefully weighed before choosing a different course. SHOULD NOT : This phrase means that there may exist valid reasons in particular circumstances when the listed behavior is acceptable or even useful, but the full implications should be understood and the case carefully weighed before implementing any behavior described with this label. MAY : This word or the adjective OPTIONAL means that this item is truly optional. One vendor may choose to include the item because a particular marketplace requires it or because it enhances the product, for example; another vendor may omit the same item. Other text is descriptive or explanatory. 2 CableLabs 12/01/99
9 PacketCable MTA Device Provisioning Specification 2 BACKGROUND 2.1 Service Goals Cable operators are interested in deploying high-speed data communications systems on cable television systems. Comcast Cable Communications, Inc., Cogeco, Cox Communications, Tele-Communications, Inc., Time Warner Cable, MediaOne, Inc., Rogers Cablesystems Limited, Le Groupe Vidéotron, and Cable Television Laboratories, Inc. (on behalf of the CableLabs member companies), have decided to prepare a series of interface specifications that will permit the early definition, design, development, and deployment of packet data over cable systems on an uniform, consistent, open, non-proprietary, multi-vendor interoperable basis. The intended service enables voice communications, video, and data services based on bidirectional transfer of Internet protocol (IP) traffic, between the cable system headend and customer locations, over an all-coaxial or hybrid-fiber/coax (HFC) cable network, defined by the data over cable service interface specification (DOCSIS) standard [16]. This is shown in simplified form in Figure 1. Figure 1. Transparent IP Traffic Through the Data-Over-Cable System The transmission path over the cable system is realized at the headend by a cable modem termination system (CMTS), and at each customer location by a cable modem (CM). At the headend (or hub), the interface to the data-over-cable system is called the cable modem termination system-network-side interface (CMTS-NSI), and is specified in [15]. At customer locations, the interface is called the cable-modem-tocustomer-premises-equipment interface (CMCI) and is specified in [14]. The intent is for operators to transfer IP traffic transparently between these interfaces. The legal/regulatory classification of IP-based voice communications provided over cable networks and otherwise, and the legal/regulatory obligations, if any, borne by providers of such voice communications, are not yet fully defined by appropriate legal and regulatory authorities. Nothing in this specification is addressed to, or intended to affect, those issues. In particular, while this document uses standard terms such as call, call signaling, telephony, etc., it will be evident from this document that while a PacketCable network performs activities analogous to these PSTN functions, the manner by which it does so differs considerably from the manner in which they are performed in the PSTN by telecommunications carriers. These differences may be significant for legal/regulatory purposes. 12/01/99 CableLabs 3
10 PacketCable MTA Device Provisioning Specification 2.2 Specification Goals The goal of this specification document is to meet and to satisfy cable member companies (a.k.a. MSO), PacketCable, and CableLabs business and technical requirements. Requirements relevant to device provisioning are: A single physical device (e.g., embedded-mta) will be completely provisioned and managed by a single business entity. This provider may establish business relationships with additional providers for services such as data, voice communications, and other services. An embedded-mta is a PacketCable 1.0 MTA combined with a DOCSIS 1.1 Cable Modem. Both DOCSIS 1.1 and PacketCable 1.0 device provisioning steps MUST be performed for this embedded-mta device to be provisioned. The embedded-mta MUST have 2 IP addresses; an IP address for the CM component, and a different IP address for the MTA component. The embedded- MTA MUST have 2 MAC addresses, one MAC address for the CM component, and a different MAC address for the MTA-component. PacketCable requires a unique FQDN for the MTA-component in the embedded- MTA. This FQDN MAY be included in the DHCP offer to the MTA-component. PacketCable makes no additional FQDN requirements on the CM component in the embedded-mta beyond those required by DOCSIS 1.1. If the FQDN is NOT included in the DHCP offer, then the FQDN MUST be included in the MTA configuration file and mapping of the FQDN to IP address MUST be configured in the network DNS server and be available to the rest of the network. PacketCable 1.0 embedded-mta provisioning MUST support two separate configuration files, a DOCSIS-specified configuration file for the CM component, and a PacketCable-specified configuration file for the MTA component. PacketCable 1.0 allows one monolithic software image supporting both CM and MTA functionality to take advantage of the DOCSIS 1.1 software download mechanism. PacketCable 1.0 does not preclude vendor innovation to support separate software images for the CM and the MTA functionality. The embedded-mta is outside the PacketCable network trust boundary as defined in the PacketCable architecture document [12]. PacketCable 1.0 MUST support DOCSIS 1.1 software download as defined in [16]. PacketCable 1.0 MUST support use of SNMPv3 security for network management operations. PacketCable 1.0 embedded-mta provisioning minimizes the impact to DOCSIS 1.1 devices (CM and CMTS) in the network Standard server solutions (TFTP, SNMP, DNS, etc.) are preferable. It is understood that an application layer may be required on top of these protocols to coordinate PacketCable 1.0 embedded-mta provisioning. 4 CableLabs 12/01/99
11 PacketCable MTA Device Provisioning Specification Where appropriate, the DOCSIS 1.1 management protocols are supported (SNMP, DHCP, TFTP). 2.3 PacketCable Refer ence Architecture Figure 2 shows the reference architecture for the PacketCable 1.0 Network. Refer to the PacketCable Architecture Document [12] for more detailed information on this reference architecture. Embedded MTA MTA Cable Modem HFC access network (DOCSIS) CMTS Call M Server Media Servers Announcement Servers Conference Mixing Bridges... Embedded MTA Managed IP Backbone (QoS Features) (Headend, Local, Regional) Media G PSTN G Controller PSTN MTA Cable Modem HFC access network (DOCSIS) CMTS Signaling Gateway OSS Backoffice Billing Provisioning Problem Resolution DHCP Servers TFTP Servers... Figure 2: PacketCable 1.0 Network Component Reference Model (partial) 2.4 Components and In terfaces The basic PacketCable 1.0 embedded-mta provisioning reference architecture is shown in Figure 3. This figure represents the components and interfaces discussed in this document. 12/01/99 CableLabs 5
12 PacketCable MTA Device Provisioning Specification DNS Server TFTP or HTTP Server TGS DHCP Server pkt-p2 pkt-p3 pkt-p4 pkt-p5 pkt-p6 CMS Provisioning Server pkt-p1 Embedded- MTA pkt-p7 SYSLOG Server Figure 3: PacketCable Provisioning Interfaces MTA The MTA MUST conform to the following requirements during the provisioning sequence MTA Security Requirem ents The MTA MUST conform to the following security requirements during the provisioning sequence. The MTA MUST generate a random number that will be exchanged as part of the device capability data to the Provisioning Application. This mechanism is referred to as using nonce. This mechanism is required to ensure correctness of the provisioning configuration data file downloaded to the MTA. The nonce MUST be regenerated every time the MTA power-on initialization occurs. The MTA MUST generate a correlation number that will be exchanged as part of the device capability data to the Provisioning Application. This value is used as an identifier to correlate related events in the MTA provisioning sequence. The MTA needs to obtain an MTA IP Telephony Certificate (X.509 certificate) for each network operator s Call Management Server(s) (CMS) assigned to an MTA s voice communications endpoint. This certificate MUST be provided to the MTA as part of the MTA s provisioning data. Please refer to [12] for further information. The MTA needs to obtain a Service Provider Certificate (X.509 certificate) from the network operator that owns the CMS assigned to an MTA s voice communications endpoint. This certificate MUST be provided to the MTA as part of the MTA s provisioning data. This Service Provider Certificate is used as the key for verifying the MTA IP Telephony Certificate. Please refer to [12] for further information. 6 CableLabs 12/01/99
13 PacketCable MTA Device Provisioning Specification The MTA MUST fail the provisioning operation if ever a CMS is assigned to an MTA s voice communications endpoint without the MTA having been provisioned with both the MTA IP Telephony Certificate and the Service Provider Certificate. The MTA device MIB is structured to represent the assignment of an MTA endpoint to a CMS. However, the security association between an MTA and a CMS is on a per-device basis. For each unique pair of CMS Kerberos principal Name / Kerberos Realm assigned to an endpoint, the MTA MUST obtain a single Kerberos ticket [12]. The MTA MUST establish a separate IPSEC security association with each CMS IP address in a CMS cluster [12]. If the MTA already has an active security association with that CMS, the MTA MUST NOT request an additional Kerberos Ticket or new IPSEC security association with that CMS MTA SNMPv3 Requirem ents The MTA MUST conform to the following SNMPv3 requirements during the provisioning sequence MTA SNMPv3 security is separate and distinct from DOCSIS SNMPv3 security. USM security information (authentication and privacy keys, and other USM table entries) is setup separately. SNMPv3 initialization MUST be completed prior to the provisioning enrollment inform. SNMPv3 security will not be available until after successful processing of the configuration file Provisioning Server The Provisioning Server is made up of the following components: Provisioning Application - The Provisioning Application is responsible for coordinating the embedded-mta provisioning process. This application has an associated SNMP Entity. Provisioning SNMP Entity The provisioning SNMP entity includes a trap handler for provisioning enrollment and the provisioning status traps as well as a SNMP engine for retrieving device capabilities and setting the TFTP filename and access method. Refer to the PacketCable MTA MIB [8] for a description of the MIB accessible MTA attributes. 12/01/99 CableLabs 7
14 PacketCable MTA Device Provisioning Specification The interface between the Provisioning Application and the associated SNMP Entity is not specified in PacketCable 1.0 and is left to vendor implementation. The interface between the Provisioning Server and the TFTP Server is not specified in PacketCable 1.0 and is left to vendor implementation Telephony Syslog Ser ver The PacketCable Telephony Syslog server functionally is identical to the DOCSIS 1.1 Syslog Server [21] MTA to DHCP Server This interface identifies specific requirements in the DHCP server and the client for IP assignment during the MTA initialization process. Both the DHCP server and the embedded-mta MUST support DHCP option code 60 and DHCP option code 177 as defined in this document. The DHCP server MUST accept and support broadcast and unicast messages from the MTA DHCP client. The DHCP server MAY include the MTA s assigned FQDN in the DHCP offer message to the MTA-component of the embedded-mta. Refer to RFC 2132 for details describing the DHCP offer message MTA to Provisioning Application This interface identifies specific requirements for the Provisioning Application to satisfy MTA initialization and registration. The Provisioning Application requirements are: The Provisioning Application MUST provide the MTA with its MTA configuration data file. The MTA configuration file is specific to the MTAcomponent of the embedded-mta and separate from the CM-component s configuration data file. The configuration data file format is TLV binary data suitable for transport over the specified TFTP or HTTP access method. The Provisioning Application MUST have the capability to configure the MTA with different data and voice service providers. The Provisioning Application MUST provide secure SNMP access to the device. The Provisioning Application MUST support online incremental device/subscriber provisioning using SNMP with security enabled MTA to CMS Signaling is the main interface between the MTA and the CMS. Refer to the PacketCable signaling document [11] for a detailed description of the interface. 8 CableLabs 12/01/99
15 PacketCable MTA Device Provisioning Specification The CMS MUST accept signaling and bearer channel requests from a MTA that has an active security association. The CMS MUST NOT accept signaling and bearer channel requests from a MTA that does not have an active security association MTA to Security Serve r (TGS) The interface between the MTA and the Ticket Granting Server (TGS) MUST conform to the PacketCable security specification [12] MTA and Configuratio n Data File Access This specification allows for more than one access method to download the configuration data file to the MTA. The MTA MUST support the TFTP access method for downloading the MTA configuration data file. The device will be provided with the URL-encoded TFTP server address and configuration filename via a SNMPv3 SET from the provisioning server. The MTA MAY support HTTP access method for downloading the MTA configuration data file. The device will be provided with the URL-encoded HTTP server address and configuration filename via a SNMPv3 SET from the provisioning server DOCSIS extensions fo r MTA Provisioning This specification requires that the following additions to DOCSIS flows for MTA auto-provisioning be supported. Additional values MUST be added to the DHCP option code 60 discover message. A new DHCP offer message option code 177 and the associated procedures MUST be implemented in DOCSIS. 12/01/99 CableLabs 9
16 PacketCable MTA Device Provisioning Specification 3 PROVISIONING O VERVIEW Provisioning is a subset of configuration management control. The provisioning aspects include, but are not limited to, defining configurable data attributes, managing defined attribute values, resource initialization and registration, managing resource software, and configuration data reporting. The resource (also referred to as the managed resource) always refers to the MTA device. Further, the associated subscriber is also referred to as a managed resource. 3.1 Device Provisionin g Device provisioning is the process by which an embedded-mta device is configured to support voice communications service. For example, a network provider MAY decide to configure unassociated MTAs to provide 611 service for in-band subscriber enrollment, or possibly 911 emergency service. In either case, device provisioning involves the MTA obtaining its IP configuration required for basic network connectivity, announcing itself to the network, and downloading of its configuration data from its provisioning server. The MTA device MUST be able to verify the authenticity of the configuration file it downloads from the server. Privacy of the configuration data is also necessary. Thus, the configuration data will be signed and sealed by packaging the data into a MTA device sealed object. Please refer to [12] for further information. Please refer to section for provisioning rules related to security associations. 3.2 Endpoint Provision ing Endpoint provisioning is when a provisioned MTA authenticates itself to the CMS, and establishes a security association with that server prior to becoming fully provisioned. Device registration allows subsequent call signaling to be protected under the established security association. Device registration will employ the Kerberos CMS Ticket the MTA obtained during subscriber enrollment. Please refer to [12] for further information. 3.3 Provisioning State Transitions The following represents logical device states and the possible transitions across these logical states. This representation is for illustrative purposes only, and is not meant to imply a specific implementation. Definitions of these logical states are above and beyond the DOCSIS CM State definitions, except the DHCP sequence, which is the same for both a CM and an MTA. The following state transitions do not specify the number of retry attempts or retry time out values. 10 CableLabs 12/01/99
17 PacketCable MTA Device Provisioning Specification UNKNOWN RETRY dhcp fail RESET/INIT dhcp ok KNOWN Config data ok PROVISIONED Security Exchange ok RETRY Config data FAIL RETRY Security Exchange FAIL UN-PROVISIONED UN- AUTHENTICATED AUTHENTICATED Figure 4. Device States and State Transitions 12/01/99 CableLabs 11
18 PacketCable MTA Device Provisioning Specification 4 PROVISIONING F LOWS 4.1 Backoff, Retries, an d Timeouts Backoff mechanisms help the network to throttle device registration during a typical or mass registration condition when the MTA client requests are not serviced within the protocol specified timeout values. The details of provisioning behavior under mass-registration is beyond the scope of PacketCable 1.0, however this section provides the following recommendations and requirements. The recommendation for the throttling of registration MAY be based on DOCSIS 1.1 CM registration. The MTA MUST follow DHCP [1] and HTTP specification timeout and retry mechanisms. The MTA MUST use an adaptive timeout for TFTP as specified in the DOCSIS 1.1 specification. The MTA MUST follow backoff and retry recommendations that are defined in the security specification [12] for the security message flows. 4.2 Embedded-MTA Po wer-on Initialization Flows Following is the representative message flow that the embedded-mta device follows during power-on initialization. Note that these flows are informative and for reference only. It is understood that these flows do not imply implementation or limit functionality. Although these flows show the MTA configuration file download from a TFTP Server, the descriptive text details the requirements to support the MTA configuration file download from a HTTP Server. Note in the flow details below that certain steps may appear to be a loop in the event of a failure. In other words, the step to proceed to if a given step fails, is to retry that step again. However, it is recommended that if the desired number of backoff and retry attempts does not allow the step to successfully complete, the device detecting the failure should generate a failure event notification. 12 CableLabs 12/01/99
19 PacketCable MTA Device Provisioning Specification Flow CM / MTA CMTS DOCSIS DOCSIS DOCSIS DHCP TFTP ToD Prov Server PKT DHCP PKT DNS PKT TFTP TGS CMS SYSLOG Start with DOCSIS 1.1 Initialization/Registration CM-1 DHCP Broadcast Discover (Option Code 60 w/ MTA device identifier) CM-2 DHCP Offer (Option Code 177 w/ telephony service provider s DHCP server address) CM-3 DHCP Request (device id, e.g., macaddr) CM-4 DHCP Ack (CM IP, ftp srv addr, CM configuration filename) CM-5 DOCSIS 1.1 CM config file request CM-6 DOCSIS 1.1 config file CM-7 ToD Request CM-8 ToD Response CM-9 CM registration with CMTS CM-10 CMTS Registration ACK Complete DOCSIS 1.1 Initialization/Registration MTA-1 Unicast DHCP Unicast Discover (option code 60 w/ MTA device identifier) MTA2 DHCP Offer (option code 177w/ telephony service provider s SNMP entity address) MTA-3 DHCP Request MTA-4 DHCP Ack MTA-5 SNMP Inform (see table for data list) MTA-6 SNMP Get Request(s) for MTA device capabilities (optional/iterative) MTA-7 SNMP Get Response(s) containing MTA device capabilities (optional/iterative) MTA-8 MTA config file MTA-9 SNMP Set with URL encoded file download access method (TFTP or HTTP) and filename MTA-10 Resolve TFTP server FQDN MTA-11 TFTP server IP address MTA-12 Telephony config file request MTA-13 Telephony config file MTA-14 MTA send telephony service provider SYSLOG a notification of provisioning completed MTA-15 Notify completion of telephony provisioning (MTA MAC address, ESN, pass/fail) SEC-1 Kerberos PKINIT REQ (MTA s IP Telephony Certificate, MTA FQDN, provisioned CMS ID) SEC-2 PKINIT Reply (CMS Kerberos Ticket) SEC-3 Kerberos AP Request (CMS kerberos ticket) SEC-4 Kerberos AP Reply (Ipsec security association) SEC-5 SA Recovered (MTA is ready to operate with a new IP SEC SA) Figure 5. Embedded-MTA Power-on Initialization Flow 12/01/99 CableLabs 13
20 PacketCable MTA Device Provisioning Specification Flow CM1 CM2 CM3 CM4 CM5- CM10 MTA1 MTA2 MTA3 Embedded-MTA Power-On Initialization Flow Description As defined in the DOCSIS 1.1 specified registration sequence, the client device begins device registration by having the cable modem component send a broadcast DHCP discover message. Included in this message is a device identifier (option code 60) to identify the device as either a DOCSIS device or a DOCSIS device with an embedded MTA. The remainder of this message MUST conform to the DHCP discover data as defined in the DOCSIS 1.1 specification. One or more DHCP servers may respond with a DHCP offer message. To be considered a valid DHCP offer for PacketCable voice communications, the offer message MUST contain the PacketCable option code 177 with sub-option 1. The client device MUST select a single DHCP offer that includes the PacketCable code 177 values as defined in section 5.1 to function as a PacketCable voice communications-enabled device. The client device may select the first valid DHCP offer, or it may use it s own internal selection rules to determine which valid DHCP offer to accept. The client device sends the appropriate DHCP server a DHCP REQUEST message to accept the DHCP offer. Refer to [1] in Appendix B for more details concerning the DHCP protocol. The DHCP server sends the client device cable modem component a DHCP ACK message to confirm acceptance of the offered data. The client device s cable modem component completes the remainder of the DOCSIS 1.1 specified registration sequence. This includes downloading the DOCSIS configuration file, requesting time of day registration, and registering with the CMTS. The MTA sends a unicast DHCP DISCOVER message to the DHCP server address specified in the DOCSIS-level DHCP Offer Message (Option code 177 from CM2 above). Included in this message is a device identifier (option code 60) to identify the device as a DOCSIS device with an embedded MTA. (refer to section 5.2). Only the specified DHCP server will respond with a DHCP offer message. This offer will contain the IP address to be used for the client device s MTA component. It will also include the PacketCable Option Code 177 with sub-option 2 and optionally sub-options 3 and 4 if the network is DNS-enabled. The client device s MTA component MUST select this DHCP offer. The MTA component sends the appropriate DHCP server a DHCP REQUEST message to accept the DHCP offer. Refer to [1] in Appendix B for more details concerning the DHCP protocol. Proceed to here if this step fails Per DOCSIS Per DOCSIS Per DOCSIS Per DOCSIS Per DOCSIS Per DHCP protocol Per DHCP protocol Per DHCP protocol 14 CableLabs 12/01/99
21 PacketCable MTA Device Provisioning Specification Flow MTA4 Embedded-MTA Power-On Initialization Flow Description The DHCP server sends the client device s MTA component a DHCP ACK message which MUST contain the IPv4 address of the MTA and MAY contain the FQDN to confirm acceptance of the offered data. Proceed to here if this step fails Per DHCP protocol MTA5 Note: The FQDN MUST be available in the device before Kerberos Ticket generation can occur. The client device MTA component sends the PROV_SNMP_ENTITY a SNMPv3 INFORM requesting enrollment. The IP address of this PROV_SNMP_ENTITY is contained in the PacketCable DHCP offer message. As defined in the security spec [12], the MTA MUST create a randomly generated nonce and include the nonce in the MTA device signature. The following information MUST be in the PktcMtaProvisioningEnrollment object: Hardware Version Software Version Device Identifier String (EMTA:PKTC1.0:DOCSIS1.1:xxxxxx) MAC address Telephony Provisioning Correlation ID MTA device signature (includes randomly generated nonce value) This is used for authentication. Refer to the Security Spec [12] for more details. Please refer to the PktcMtaProvisioningEnrollment object in the MTA MIB [8] for a detailed description of these data values. The PROV_SNMP_ENTITY notifies the PROV_APP that the MTA has entered the management domain. NOTE: The Telephony Provisioning Correlation ID is a numeric value that is used to correlate the configuration download notification insteps MTA-14 and MTA-15 with this enrollment request. NOTE: Both the MTA device signature and the nonce MUST be regenerated every time this step occurs. NOTE: SNMPv3 initialization MUST have occurred prior to the sending of this inform. MTA5 12/01/99 CableLabs 15
22 PacketCable MTA Device Provisioning Specification Flow MTA6 MTA7 MTA8 MTA9 Embedded-MTA Power-On Initialization Flow Description (Optional) If any additional MTA device capabilities are needed by the PROV_APP, the PROV_APP requests these from the MTA via SNMPv3 Get Requests. This is done by having the PROV_APP send the PROV_SNMP_ENTITY a get request Iterative: The PROV_SNMP_ENTITY sends the MTA one or more SNMPv3 GET requests to obtain any needed MTA capability information. The Provisioning Application may use a GETBulk request to obtain several pieces of information in a single message. Each PROV_SNMP_ENTITY SNMP Get command MUST encapsulate the SNMPv3 message using the MTA Device signature obtained from the provisioning enrollment inform, with the exception of the SNMPv3 Get requests to get the MTA device certificate and MTA Manufacturer certificate. Refer to the security specification [12] for handling of the SNMPv3 get commands for the MTA device certificate and MTA Manufacturer certificate. Iterative: MTA sends the PROV_SNMP_ENTITY a Get Response for each Get Request. After all the Gets, or the GetBulk, finish, the PROV_SNMP_ENTITY sends the requested data to the PROV_APP. The MTA device signature in these responses MUST include the same nonce value that was originally included in the corresponding SNMPv3 INFORM message. The PROV_APP uses the information to determine the contents of the MTA Configuration Data file and creates the configuration file at this point. The PROV_APP stores the configuration file on the appropriate TFTP server. The configuration file is signed by the PROV_APP with the Prov Server s private key and sealed with the MTA s public key, using a MTA device signature wrapper defined in the security specification. The nonce value included in this MTA device signature MUST be the same nonce value that was sent by the MTA in the corresponding SNMP INFORM message in flow MTA-5. The PROV_APP then instructs the PROV_SNMP_ENTITY to send an SNMP Set message to the MTA containing the URL-encoded file access method and filename (i.e. tftp:<filename>) Note: In the case of file download using the HTTP access method, the URL-encoded filename is : or FQDN of access server}/ mta-config-filename Proceed to here if this step fails MTA6 MTA6 MTA8 MTA9 MTA10 - MTA11 If the URL-encoded access method contains a FQDN instead of an IPv4 address, the MTA will use the service provider network s DNS server to resolve the FQDN into an IPv4 address of either the TFTP Server or the HTTP Server. MTA10 16 CableLabs 12/01/99
23 PacketCable MTA Device Provisioning Specification Flow MTA12 Embedded-MTA Power-On Initialization Flow Description The MTA sends the TFTP Server a TFTP Get Request to request the specified configuration data file. Proceed to here if this step fails MTA12 MTA13 MTA14 MTA15 Note: In the case of file download using the HTTP access method, the MTA sends the HTTP server a request for the specified configuration data file. The TFTP Server sends the MTA a TFTP Response containing the requested file. In the case of file download using the HTTP access method, the HTTP server sends the MTA a response containing the requested file. Refer to section 6.2 for MTA configuration file contents. NOTE: At this stage, the MTA device provisioning data is sufficient to provide any minimal services as determined by the service provider (e.g. 611, 911) NOTE: SNMPv3 authentication and privacy keys are included in this configuration file. These keys are used to turn on PacketCable SNMPv3 security with both message integrity and privacy on all subsequent SNMP messages Enable SNMPv3 security if no error condition occurred during this step. If PacketCable and DOCSIS share the same SNMPv3 manager, then the SNMPv3 kickstart for DOCSIS MUST already have been enabled and MUST also have enabled SNMPv3 security for PacketCable and no additional PacketCable SNMPv3 security actions are required. Otherwise, SNMPv3 security for PacketCable MUST be enabled in this step. The MTA sends the voice service provider s SYSLOG (identified in the configuration data file) a provisioning complete notification. This notification will include the pass-fail result of the provisioning operation. The general format of this notification is as defined in the DOCSIS Cable Modem Device MIB specification details on syslog events. The MTA MUST send the PROV_SNMP_ENTITY an SNMP INFORM containing a provisioning complete notification. The following information MUST be in the PktcMtaProvisioningStatus object: MAC address Telephony Provisioning Correlation ID MTA device signature (includes randomly generated nonce value) Provisioning State (PASS or FAIL) Repeat MTA13 if the configuration file download failed. Otherwise, proceed to MTA14 and send the failed response if the MTA configuration file itself is in error. A vendor MAY consider returning to MTA5, repeating until it is determined to be a hard failure and then MUST continue to MTA15. MTA MAY generate a Provisioning Failure event notification to the Service Provider s Fault Management server. Provisioning process stops; Manual interaction required 12/01/99 CableLabs 17
24 PacketCable MTA Device Provisioning Specification Flow Embedded-MTA Power-On Initialization Flow Description NOTE: The following security flows are only performed for the first endpoint provisioned with this CMS Name. If another endpoint on this MTA already has an active security association with the specified CMS, then the following steps MUST NOT be performed. Proceed to here if this step fails Get Kerberos tickets associated with each CMS with which the MTA communicates. Note: SEC1 and SEC2 MUST be repeated for each CMS with which the MTA communicates. SEC1 For each different CMS assigned to voice communications endpoints, the MTA requests a Kerberos Ticket for the CMS by sending a PKINIT REQUEST message to the TGS containing the MTA Telephony Certificate (specified in the MTA configuration file), the MTA FQDN and the assigned CMS Identifier. SEC2 The TGS sends the MTA a PKINIT REPLY message containing the CMS Kerberos Ticket for the assigned CMS. Establish IPSEC security association between the MTA and each CMS with which the MTA communicates. Note: SEC3, SEC4, and SEC5 MUST be repeated for each CMS with which the MTA communicates. SEC3 The MTA requests a pair of IPSEC simplex Security Associations (inbound and outbound) with the assigned CMS by sending the assigned CMS a Kerberos AP REQUEST message containing the CMS Kerberos Ticket. SEC4 The CMS establishes the Security Associations by sending an AP REPLY message with the corresponding IPSEC parameters SEC5 (Required during error conditions refer to security specification [12] for error handling) The MTA responds with an SA Recovered message that lets the CMS know, the MTA is now ready to receive on its incoming IPSEC Security Association 18 CableLabs 12/01/99
25 PacketCable MTA Device Provisioning Specification 4.3 Post Initialization I ncremental Provisioning This section describes the flows allowing the Provisioning Application to perform incremental provisioning of individual voice communications endpoints after the MTA has been initialized and authenticated. Post-Initialization incremental provisioning MAY involve communication with a Customer Service Representative (CSR) Synchronization of Pr ovisioning Attributes with Configuration File Incremental provisioning includes adding, deleting and modifying subscriber services on one or more endpoints of the embedded-mta. Services on an MTA endpoint MUST be modified using SMNPv3 via the MTA MIB [8]. The back office applications MUST support a flow-through provisioning mechanism that synchronizes all device provisioning information on the embedded-mta with the appropriate back office databases and servers. Synchronization is required in the event that provisioning information needs to be recovered in order to re-initialize the device. Although the details of the back office synchronization are beyond the scope of this document, it is expected that, at a minimum, the following information is updated: customer records, and the MTA configuration file on the TFTP or HTTP server Enabling Services on an MTA Endpoint Services may be provisioned on a per-endpoint basis whenever it is desired to add or modify service to a previously unprovisioned endpoint. This would be the case if a customer was already subscribing to service on one or more lines (endpoints), and now wanted to add additional service on another line (endpoint). MTA Endpoint services are enabled using SMNPv3 via the MTA MIB [8]. In this example, a subscriber is requesting that additional service be added. This example assumes the service provider s account creation process has been completed, and shows only the applications critical for the flows. For instance, account creation and billing database creation are assumed to be available and integrated in the back office application suite. Prov Flow MTA TGS CMS SYSLOG App OSS back office notifices the Prov App that a new MTA endpoint must be activated. EPT1 Update endpoint service provisioning information using SNMP set(s). EPT2 SEC1 SEC2 SEC3 SEC4 SEC5 MTA send telephony service provider SYSLOG a notification of provisioning completed Kerberos PKINIT Request Kerberos PKINIT Reply (CMS ticket) Kerberos AP Request Kerberos AP Reply SA Recovered 12/01/99 CableLabs 19
26 PacketCable MTA Device Provisioning Specification Enabling Services on an MTA Endpoint Flow EPT1 EPT2 SEC1 SEC2 SEC3 SEC4 SEC5 Flow Description The Provisioning Application will now use SNMP Sets to update provisioning attributes on the device for which the device port is being enabled. These SET operations MUST include the device port CMS ID (associate the device port to the CMS ID from which the features will be supported), the device port to enable, and the MTA IP Telephony Certificate from the selected service provider. See section for details of provisioning rules. The MTA sends the service provider s SYSLOG (identified in the configuration data file) a provisioning complete notification. This notification will include the pass-fail result of the provisioning operation. The general format of this notification is as defined in the DOCSIS Cable Modem Device MIB specification details on syslog events. NOTE: The following security flows assume that this is the first endpoint provisioned with this CMS Name. If another endpoint on this MTA already has an active security association with the specified CMS, then the following steps MUST NOT be performed. For each different CMS assigned to voice communications endpoints, the MTA requests a certificate for the CMS by sending a PKINIT REQUEST message to the TGS containing the MTA IP Telephony Certificate, the MTA FQDN and the assigned CMS Identifier. The TGS sends the MTA a PKINIT REPLY message containing the CMS Kerberos Ticket for the assigned CMS. The MTA requests a security association with the assigned CMS by sending the assigned CMS a Kerberos AP REQUEST message containing the CMS Kerberos Ticket. The CMS establishes the security association by sending an AP REPLY message with the IPSEC Security Association parameters. (Required during error conditions refer to security specification [12] for error handling) The MTA responds with an SA Recovered message that lets the CMS know, the MTA is now ready to receive on its incoming IPSEC Security Association Disabling Services on an MTA Endpoint MTA Endpoint services are disabled using SMNP Sets to the MTA. In this scenario, subscriber s voice communications service is disabled from one of the MTA endpoints. This example assumes the service provider s account update process has been completed and shows only the applications critical to MTA operation. Prov Flow MTA TGS SYSLOG App OSS back office notifices the Prov App that a new MTA endpoint must be activated. EPT1 Delete endpoint service provisioning information using SNMP set(s). EPT2 MTA sends telephony service provider SYSLOG notification of completed provisioning ope 20 CableLabs 12/01/99
27 PacketCable MTA Device Provisioning Specification Disabling Services on an MTA Endpoint Flow EPT1 EPT2 Flow Description The Provisioning Application will now use SNMP Sets to delete provisioning attributes from the device endpoint for which the service is being disabled. This MUST include setting the associated security parameters to a NULL value. The MTA sends the service provider s SYSLOG (identified in the configuration data file) a provisioning complete notification. This notification will include the pass-fail result of the provisioning operation. The general format of this notification is as defined in the DOCSIS Cable Modem Device MIB specification details on SYSLOG events Modifying Services on an MTA Endpoint MTA Endpoint services are modified using SMNPv3 Sets to the MTA MIB [8]. In this scenario subscriber s voice communications service features are being modified on one of the MTA endpoints. Once again, the accounting management aspects of the back office application are assumed to be correct. The following are possible service modifications and none of these modifications cause the device to recreate the subscriber ticket from the TGS system. 1. Modification of call service features (add, delete call features). Changes to services require modifications in the CMS, not in the MTA. 2. Modification of service level (change the subscriber service levels with respect to the QoS definition). This is part of the DOCSIS 1.1 provisioning and requires changes to the CM component in the MTA which requires rebooting the embedded-mta. This updates the MTA (CM) as the initialization sequence is executed as part of the bootup process. 4.4 MTA Replacement The initialization sequence for the replaced MTA will be same as the MTA s firsttime initialization described in section 4. Once the MTA is initialized, an additional step is required by the network management system to move the profile from the old MTA to the new MTA. The subscriber account migration can occur with the help of the Customer Service Representative (CSR) provided the CSR can validate the subscriber account information. If the subscriber uses Interactive Voice Response (IVR) and Web-Based Enterprise Management (WBEM) systems to migrate profiles from old MTA to the new MTA, the IVR and WBEM systems are expected to validate the subscriber identification and allow profile migration process. The detailed process for migrating subscriber profiles from the old MTA to the new MTA is beyond the scope of this document. The initialization flow as described in section 4 will apply for the replaced MTA. If the replaced MTA is new or if the replaced MTA has registered once, then all the above-described flows are applicable. 12/01/99 CableLabs 21
28 PacketCable MTA Device Provisioning Specification 4.5 Temporary Signal L oss The treatment for RF loss in the MTA MUST be similar to that of a DOCSIS CM. Therefore, if the RF loss at the MTA is sufficient to cause the MTA to reinitialize, then the MTA is required to repeat the initialization sequence described in section CableLabs 12/01/99
29 PacketCable MTA Device Provisioning Specification 5 DHCP OPTIONS DHCP is used to obtain IPv4 addresses for both the CM and the MTA. The DHCP option code 60 and option code 177 described in the table below MUST be supported during the CM and the MTA DHCP messages. These DHCP options are currently defined in a draft proposal submitted to the Internet Engineering Task Force (IETF) DHCP committee [10]. 5.1 Code 177: PacketC able Servers Option DHCP option code 177 is a temporary code that the PacketCable embedded-mta device can use until a permanent code is assigned by the IETF. Refer to the power-on initialization flows in section 4 for further details. DHCP option code 177 is used in both the CM and MTA DHCP OFFER messages to identify a list of valid PacketCable network servers. The PacketCable servers are identified using either an IPv4 address or a FQDN. Each sub-option of DHCP option code 177 identifies a particular type of PacketCable server. Sub-option 1 identifies the PacketCable network DHCP server, sub-option 2 identifies the PacketCable service provider s SNMP entity, and sub-options 3 and 4 identifies the primary and secondary PacketCable network DNS servers. Refer to RFC 2132 section 2 [2] for DHCP encoding and formatting details. During the DOCSIS 1.1 device provisioning sequence of an embedded-mta, the following fields MUST be included in the CM s DHCP OFFER message. PacketCable-defined DHCP option fields are encoded in the following format using option code 177. Option 177 Suboption Description and Comments 1 Service Provider s DHCP Server Address 2 Service Provider s SNMP Entity Address 3 Service Provider Network Primary Domain Name Server 4 Service Provider Network Secondary Domain Name Server The following sections provide detailed descriptions of each sub-option of DHCP option code 177. Note that UDP port numbers are normally standard values as defined in [3]. However, the format of the sub-option data fields defined here have a provision to optionally include port numbers for these systems if a port number other than the standard is required. If no port number is specified, the standard port number based on the definitions in [3] is assumed. For example, the standard DNS UDP port number is 42/udp. 12/01/99 CableLabs 23
30 PacketCable MTA Device Provisioning Specification Service Provider s DH CP Server Address (sub-option 1) The Service Provider s DHCP Server Address identifies the DHCP server that will be used to obtain an MTA-unique IP address for a given service provider s network administrative domain. This address can be configured as either an FQDN or as an IPv4 address. Since FQDN and IPv4 are of two different formats, a syntax was chosen which allows a way of specifying either address format as a DISPLAYSTRING. The syntax for this method is shown in the table below. Refer to RFC 821 for additional details concerning the syntax for this bracketed IP address notation. The encoding of sub-option 1 is as follows: Option Value [xxx.xxx.xxx.xxx]:nnnn FQDN:NNNN Comments Either the IP address or the FQDN will be configured. Where NNNN is an optional UDP port number if different than the well-known port defined in [3] Service Provider s SN MP Entity Address (sub-option 2) The Service Provider s SNMP Entity Address is the network address of the default server for a given voice service provider s network administrative domain. The Service Provider s SNMP Entity Address component MUST be capable of accepting SNMP traps. This address can be configured as either an FQDN or as an IPv4 address. Since FQDN and IPv4 are of two different formats, a syntax was chosen which allows a way of specifying either address attribute as a DISPLAYSTRING. The syntax for this method is shown in the table below. Refer to RFC 821 for additional details concerning the syntax for this bracketed IP address notation. The encoding of sub-option 2 is as follows: Option Suboption Suboption Value [xxx.xxx.xxx.xxx]:nnnn FQDN:NNNN Comments Either the IPv4 address or the FQDN will be configured. Where NNNN is an optional UDP port number if different than the well-known port defined in [3]. 24 CableLabs 12/01/99
31 PacketCable MTA Device Provisioning Specification DNS system (sub-opti on 3 and sub-option 4) The Service Provider s DNS server is required to resolve a PacketCable device s FQDN into an IPv4 address. The DNS server s address MUST be specified in the IPv4 format. Sub-option 3 is the address of the network s primary DNS server and MUST be specified if sub-option 1 or sub-option 2 is in FQDN format. Sub-option 4 is the address of the network s secondary DNS server. Sub-option 4 MAY be specified to identify a redundant or backup DNS server. The encoding syntax for sub-option 3 and sub-option 4 is as follows: Option Suboption Value Comments [xxx.xxx.xxx.xxx]:nnnn This field is the IPv4 address of the service provider s primary DNS server. Where NNNN is an optional UDP port number if different than the wellknown port defined in [3] [xxx.xxx.xxx.xxx]:nnnn This field is the IPv4 address of the service provider s secondary DNS server. Where NNNN is an optional UDP port number if different than the well known port defined in [3]. 5.2 Code 60: Vendor C lient Identifier Option code 60 contains encoded ASCII values representing the type of PacketCable MTA. Possible values are for an embedded MTA and for future use a standalone MTA. Both the CM-component and the MTA-component of an embedded-mta MUST encode this option in their DHCP discover messages. The following table shows the PacketCable extensions to the DOCSIS 1.1 option 60 requirements. 12/01/99 CableLabs 25
32 PacketCable MTA Device Provisioning Specification Option Length Value Comments EMTA:PKTC1.0:DOCSIS1.1:xxx xxxx EMTA:PKTC1.1:DOCSIS1.1:xxx xxxx SMTA:PKTC1.0:DOCSIS1.1:xxx xxxx (for future use) SMTA:PKTC1.1:DOCSIS1.1:xxx xxxx (for future use) The CM-component and the MTAcomponent encodes option 60 in the DHCP messages. Where PKTC stands for PacketCable, and EMTA, refers to embedded MTA and SMTA refers to Standalone MTA. The suffix xxxxxxx are defined by DOCSIS CableLabs 12/01/99
33 PacketCable MTA Device Provisioning Specification 6 MTA PROVISION ABLE ATTRIBUTES This section includes the list of attributes and their associated properties used in device provisioning. All of the provisionable attributes specified in this section MAY be updated via the MTA configuration data file, or on a per-attribute basis using SMNP with security. PacketCable 1.0 requires that a MTA configuration data file MUST be provided to all embedded-mtas during the registration sequence. If no voice services are enabled at the time of device initialization, the configuration data file MUST include all Device Level Configuration Data to explicitly configure device level information as desired by the network service provider. These items are contained in the table defined in section MTA Configuration File Name The MTA configuration data filename generated by the Provisioning Application MUST be less than 255 bytes in length and cannot be NULL. Since this filename is provided to the MTA by the Provisioning Application during the registration sequence, it is not necessary to specify a file naming convention. 6.2 MTA Configuration File The following is a list of attributes and their syntax for objects included in the MTA configuration file. This file contains a series of type length and value (TLV) parameters. Each TLV parameter in the configuration file describes an MTA or endpoint attribute. The configuration data file includes TLVs that have read-write, read only, and no MIB access. Unless specifically indicated, all MIB-accessible configuration file parameters MUST be defined using DOCSIS TLV type 11. Type Length Value 11 n variable binding where the value is an SNMP VarBind as defined in [RFC-1157]. The VarBind is encoded in ASN.1 Basic Encoding Rules, just as it would be if part of an SNMP Set request. The MTA configuration file MUST start with the telephony configuration file start tag and MUST end with the telephony configuration file end tag. These tags enable the MTA TLV parameters to be distinguished from DOCSIS TLV parameters. These tags also provide deterministic indications for start and stop of the MTA configuration file. The MTA configuration file MUST contain the Device Level Configuration Data. The MTA configuration file MUST be sent to the embedded-mta every time this device is powered on. The MTA enrollment inform (step MTA-5 of the provisioning flow) is the trigger which causes the configuration file to be sent to the embedded-mta. 12/01/99 CableLabs 27
34 PacketCable MTA Device Provisioning Specification The MTA configuration file MAY contain Device Level Service Data. If the MTA configuration file contains Device Level Service Data, then it MUST contain the attributes identified as required in the table below and MAY contain any of the non-required attributes. The Device Level Service Data MUST be sent to the MTA when voice communications service is activated. The Device Level Service Data MAY be sent to the MTA as part of the MTA configuration file or it MAY be sent to the MTA via SNMP with security. Refer to section for a discussion concerning synchronization of provisioning attributes with back office systems. The MTA configuration file MAY contain Per-Endpoint Configuration Data. If the MTA configuration file contains Per-Endpoint Configuration Data, then, for each MTA endpoint, the file MUST contain the attributes identified as required in the table below and MAY contain any of the non-required attributes. The Per-Endpoint Configuration Data MUST be sent to the MTA when voice communications service is activated. The Per-Endpoint Configuration Data MAY be sent to the MTA as part of the MTA configuration file or it MAY be sent to the MTA via SNMP with security. Refer to section for a discussion concerning synchronization of provisioning attributes with back office systems. Authentication of the MTA configuration file MUST be supported via the MTA-generated nonce sent in the SNMP Inform. If the MTA configuration file can NOT be authenticated, then the MTA configuration file MUST be discarded Device Level Configur ation Data Refer to the MTA MIB [8] for more detailed information concerning these attributes and their default values. The MTA Device signature is sent by the MTA to authenticate messages it sends to other servers in MTA-5 and MTA-7. There is no privacy of capability data unless enabled in SNMPv3 prior to flow MTA-5 The MTA Manufacturer Certificate validates the MTA Device Certificate. Attribute Syntax Configuration Access Telephony Config File Start Telephony Config File End SNMP Access Comments Integer W,required None Type length value The MTA config file MUST start with this attribute. Integer W,required None Type length value This MUST be the last attribute in the MTA config file. 28 CableLabs 12/01/99
35 PacketCable MTA Device Provisioning Specification Attribute Syntax Configuration Access Telephony MTA Admin State Packet Cable MTA Device FQDN Telephony Service Provider SNMP Entity Telephony Service Provider DHCP Server SNMP Access Comments ENUM W,required R/W Used to enable/disable all telephony ports on the MTA. Applies to the MTA side of the embedded-mta or the entire stand-alone MTA. Allows blanket management of all telephony ports (external interfaces) on the device. Enabled allows all telephony ports to manage traffic carrying capability on an individual basis. Disabled disallows traffic carrying capability of all MTA telephony endpoints. Telephony call setup requests, and post-power-onprovisioning SNMP sets will be rejected by the MTA while in a disabled state. Therefore, this attribute MUST be enabled before SNMP perendpoint provisioning can occur. String W, required (refer to note) R/W Fully Qualified Domain Name for this Device. Note: If the FQDN is NOT included in the DHCP offer, then the FQDN MUST be included in the MTA configuration file and mapping of the FQDN to IP address MUST be configured in the network DNS server and be available to the rest of the network. String W,required R/W This attribute is the FQDN or IPv4 address of the MTA s SNMP Entity. The MTA MUST reject the MTA config file if this value is not provided. If this value is NULL in the MTA config file, then the value provided in DHCP 177 sub-option 2 of the CMcomponent DOCSIS 1.1 DHCP offer MUST be used. String W,required R/W This attribute is the FQDN or IPv4 address of the MTA DHCP Server. This attribute identifies the DHCP server to which the MTA requests IPv4 address lease renewals. If this value is NULL in the MTA config file, then the value provided in DHCP 177 sub-option 1 of the MTAcomponent DOCSIS 1.1 DHCP offer MUST be used. 12/01/99 CableLabs 29
36 PacketCable MTA Device Provisioning Specification Attribute Syntax Configuration Access Telephony Provider Syslog Server PacketCable Telephony Provisioning Correlation ID SNMP Access Comments String W,required R/W This attribute is the FQDN or IPv4 address of the MTA system log server. If this value is NULL in the MTA config file, then the address of the syslog server provided in the DOCSIS CableDevice MIB MUST be used. If this value is , then it implies that syslog logging for the MTA is turned off. Interger32 W,required R/O Arbitrary value generated by the MTA for use in registration authorization. It is for use only in the MTA initialization messages and for MTA configuration file download. MTA Privacy Key String W,required None MTA Privacy Key MTA config file attribute (NOT in MIB). A unique 16 byte string created by the Provisioning Application and used by the MTA and the Provisioning Application to derive the SNMPv3 encryption key for this MTA. There must be a separate SNMPv3 management user for each MTA. Refer to RFC The MTA Privacy key does not need to be on a per-endpoint basis (i.e. multiple endpoints can share the same key.). MTA Authentication Key String W,required None MTA Authentication Key - MTA config file attributes (NOT in MIB). A unique 16 byte string created by the Provisioning Application and used by the MTA and the Provisioning Application to establish SNMPv3 security and authenticate messages. (used in MTA-13). USM User Name String W,required None The name of the user. This is used as the index to the other USM information. Note: This object is a MIB table index. USM User Authentication Protocol USM User Privacy Protocol MTA Device Certificate ENUM W,required R/W This specifies the authentication protocol used in SNMPv3 messages. ENUM W,required R/W This specifies the privacy protocol used in SNMPv3 messages. String W,required R/O MTA Device Certificate - The MTA's X.509 public-key certificate installed in the embedded-mta by the manufacturer. 30 CableLabs 12/01/99
37 PacketCable MTA Device Provisioning Specification Attribute Syntax Configuration Access MTA Manufacturer Certificate MTA Device Signature SNMP Access Comments String W,required R/O MTA Manufacturer Certificate - The MTA Manufacturer s X.509 public-key certificate. This certificate is required to validate the MTA s Device Certificate. String W,required R/W MTA Device Signature - A unique signature created by the MTA for each SNMP Inform or SNMP Trap or SNMP GetResponse message exchanged (MTA-5 and MTA-7) prior to enabling SNMPv3 security. The MTA Digital Signature is in the Cryptographic message syntax, ASN.1 encoded Device Level Service Data Refer to the MTA MIB [8], the NCS MIB [9], the NCS Call Signaling specification [11] and RFC 2475 [28] for more detailed information concerning these attributes and their default values. 12/01/99 CableLabs 31
38 PacketCable MTA Device Provisioning Specification Attribute Syntax Configuration Access NCS Default Call Signaling TOS NCS Default Media Stream TOS NCS TOS Format Selector SNMP Access Comments Integer W, required R/W The default value used in the IP header for setting the TOS value for NCS call signaling. Integer W, required R/W The default value used in the IP header for setting the TOS value for NCS media stream packets. ENUM W, required R/W The format of the default NCS signaling and media TOS values. Allowed values are IPv4 TOS octet or DSCP codepoint. Refer to IETF RFC R0 cadence Bit-field W,required R/W User defined bit field where each bit represents a duration of 200 milliseconds (6 seconds total) 1 = active ringing, 0 = silence. If this field is not going to be used, it MUST be set to zero. R6 cadence Bit-field W,required R/W User defined bit field where each bit represents a duration of 200 milliseconds (6 seconds total) 1 = active ringing, 0 = silence. If this field is not going to be used, it MUST be set to zero. R7 cadence Bit-field W,required R/W User defined bit field where each bit represents a duration of 200 milliseconds (6 seconds total) 1 = active ringing, 0 = silence If this field is not going to be used, it MUST be set to zero Per-Endpoint Configu ration Data Refer to the NCS MIB [9], the NCS spec [11], the security spec [12] and the MTA MIB [8] for more detailed information concerning these attributes and their default values. MTA sends TGS the MTA/CMS certificate, MTA s FQDN, CMS-ID. The TGS returns the MTA a "Kerberos Ticket" that says "this MTA is assigned to this CMS" The Telephony Service Provider Certificate validates the MTA Telephony Certificate If 2 different endpoints share the same CMS FQDN then all 6 security-attributes MUST be identical: Kerberos Realm, CMS Kerberos Principal Name, PKINIT grace period, TGS name list, MTA IP telephony certificate, telephony service provider certificate. If 2 different endpoints share the same Kerberos Realm and same CMS Kerberos Principal Name, then these 4 attributes MUST be identical: PKINIT grace period, TGS name list, MTA IP telephony certificate, telephony service provider certificate. 32 CableLabs 12/01/99
39 PacketCable MTA Device Provisioning Specification Attribute Syntax Access SNMP Access Comments Port Admin State ENUM W, required Call Management Server Name Call Management Server UDP Port Partial Dial Timeout Critical Dial Timeout Busy Tone Timeout String W, required R/W R/W The administrative state of the port the operator can access to either enable or disable service to the port. The administrative state can be used to disable access to the user prt without de-provisioning the subscriber. Allowed values for this attribute are: Enabled/disabled For SNMP access it is found in the iftable of MIB-II. This attribute is the FQDN or IPv4 address of the CMS assigned to the endpoint. DNS support is assumed to support multiple CMS s as described in the NCS spec. Integer W R/W UDP port for the CMS. Integer W R/W Timeout value in seconds for partial dial timeout. Integer W R/W Timeout value in seconds for critical dial timeout. Integer W R/W Timeout value in seconds for busy tone. Dial tone timeout Integer W R/W Timeout value in seconds for dialtone. Message Waiting timeout Off Hook Warning timeout Integer W R/W Timeout value in seconds for message waiting. Integer W R/W Timeout value in seconds for off hook warning. Ringing Timeout Integer W R/W Timeout value in seconds for ringing. Ringback Timeout Reorder Tone timeout Stutter dial timeout Integer W R/W Timeout value in seconds for ringback. Integer W R/W Timeout value in seconds for message waiting. Integer W R/W Timeout value in seconds for message waiting. TS Max Integer W R/W Contains the maximum time in seconds since the sending of the initial datagram. Max1 Integer W R/W The suspicious error threshold for 12/01/99 CableLabs 33
40 PacketCable MTA Device Provisioning Specification Attribute Syntax Access SNMP Access Comments each endpoint retransmission. Max2 Integer W R/W The disconnect error threshold per endpoint retransmission. Max1 Queue Enable Max2 Queue Enable Enum W R/W Enables/disables the Max1 DNS query operation when Max1 expires. Enum W R/W Enables/disables the Max2 DNS query operation when Max2 expires. MWD Integer W R/W Number of seconds to wait to restart after a restart is received. Tdinit Integer W R/W Number of seconds to wait after a disconnect. TDMin Integer W R/W Minimum number of seconds to wait after a disconnect. TDMax Integer W R/W Maximum number of seconds to wait after a disconnect. RTO Max Integer W R/W Maximum number of seconds for the retransmission timer. RTO Init Integer W R/W Initial value for the retransmission timer. Long Duration Keepalive Integer W R/W Timeout in minutes for sending long duration call notification messages. Thist Integer W R/W The timeout period in seconds before no response is declared. Telephony Service Provider Kerberos Realm String W,requir ed R/W String that identifies a collection of CMS and TGS servers. Telephony Service Provider Certificate String W,requir ed R/W The Telephony Service Provider s X.509 public-key certificate given to all MTA s who have signed up with the given Telephony Service Provider. MTA Telephony Certificate String W,requir ed R/W The MTA s X.509 public-key certificate that allows this MTA to register with any Kerberos Server in any realm belonging to the given Telephony Service Provider. (MUST contain the MTA s IPv4 or FQDN assigned by the Telephony Service Provider. NOTE: If this certificate contains the MTA s IPv4 address, then any time the IPv4 34 CableLabs 12/01/99
41 PacketCable MTA Device Provisioning Specification Attribute Syntax Access SNMP Access Comments Call Management Server Kerberos Principal Name String W, required TGS Name List String W, required PKINIT Grace Period R/W R/W address changes, the Telephony Service Provider MUST issue the MTA a new certificate. Identifies a collection of CMS s or a CMS cluster that share the same TGS and also share the same "Kerberos ticket". This information is required in order for the MTA to obtain Call Management Server Kerberos tickets. This principal name does not include the realm, which is specified as a separate field in this configuration file. A single Kerberos principal name MAY be shared among several Call Management Servers. List of FQDN or IPv4 of this endpoint s TGS server(s). There may be multiple entries of this type. The order in which these entries are listed is the priority order in which the MTA will attempt to contact them. Integer W R/W # minutes before the "Kerberos Ticket" assigned to this endpoint expires that the MTA must obtain a new "Kerberos Ticket" from the TGS Name List. If 2 endpoints share the same Kerberos Ticket, then both endpoints must have the same PKINIT grace period value. The MTA MUST obtain a new Kerberos ticket (with a PKINIT exchange) this many minutes before the old ticket expires. 12/01/99 CableLabs 35
42 PacketCable MTA Device Provisioning Specification 7 MTA DEVICE CA PABILITIES MTA device capabilities information is contained in a combination of MIBs including: IETF s MIB-II, the MTA MIB [8] the NCS MIB [9] and the DOCSIS 1.1 CableDevice MIB. Use of capabilities information by the Provisioning Application is optional. Examples of capabilities information includes: Attribute HTTP Download FileAccess Method Supported Echo Cancellation Silence suppression Connection mode Device Serial Number MAC Number of Endpoints Supported Codec Types MTA Device Identifier Active Software Version Backup Software Version 36 CableLabs 12/01/99
43 PacketCable MTA Device Provisioning Specification Appendix A. Acknowledgements On behalf of CableLabs and its participating member companies, I would like to extend a heartfelt thanks to all those who contributed to the development of this specification. Certainly all the participants of the provisioning focus team have added value to this effort by participating in the review and weekly conference calls. Particular thanks are given to Burcak Besar (3Com); Angela Lyda, Rick Morris (Arris Interactive); Steven Bellovin (AT&T); Jiri Matousek (Bay Networks); Klaus Hermanns, Azita Kia, Michael Thomas, Rich Woundy (Cisco); Deepak Patil (Com21); Jeff Ollis, Rick Vetter (General Instrument); Roger Loots (Lucent); Roy Spitzer (Telogy), Aviv Goren (Terayon); and Prithivraj Narayanan (Wipro). A special thanks is due Rick Morris (Arris), Sasha Medvinsky (GI), and Raj Deshpande (Motorola) who worked tirelessly in a challenging multi-vendor environment to build this specification. Maria Stachelek and Frank Christofferson, CableLabs 12/01/99 CableLabs 37
44 PacketCable MTA Device Provisioning Specification Appendix B. References and Bibliography [1]. DHCP: Dynamic Host Configuration Protocol, IETF RFC 2131, March [2]. DHCP Options and BOOTP Vendor Extensions, IETF, RFC 2132, March [3]. ASSIGNED NUMBERS, IETF (contains ARP/DHCP parameters), RFC 1340, July [4]. The TFTP Protocol (Revision 2), STD 33, RFC 1350, MIT, July [5]. Domain Names Concepts and Facilities, IETF, RFC 1034, STD 13, November [6]. Domain Names Implementation and Specifications, IETF RFC 1035, November [7]. Domain Name System Structure and Delegation, IETF, RFC 1591, March [8]. PacketCable MTA MIB, PKT-SP-MIBS-MTA-I , Cable Television Laboratories, Inc., December 1, [9]. PacketCable NCS MIB, PKT-SP-MIBS-NCS-I , Cable Television Laboratories, Inc., December 1, [10]. PacketCable Vendor specific DHCP option, a PacketCable proposal to the IETF DHCP Committee. Primary Author Burcak Baser 3COM. [11]. PacketCable Network-Based Call Signaling Protocol Specification, PKT-SP- EC-MGCP-I , Cable Television Laboratories, Inc., December 1, 1999, [12]. PacketCable Security Specification, PKT-SP-SEC-I , Cable Television Laboratories, Inc., December 1, 1999, [13]. PacketCable Architecture Framework Technical Report, PKT-TR-ARCH-I , December 1, 1999, Cable Television Laboratories, Inc., December 1, 1999, [14]. Cable Modem to Customer Premise Equipment Interface Specification, CMCI, DOCSIS SP-CMCI-I , Cable Television Laboratories, Inc. [15]. Cable Modem Termination System - Network Side Interface Specification, Cable Television Laboratories, Inc., July 22, 1996, [16]. Data-Over-Cable Service Interface Specifications, Radio Frequency Interface Specification, SP-RFIv1.1-I , Cable Television Laboratories, Inc., November 05, [17]. SNMPv2-TM, RFC1449. [18]. SNMPv2-TC, RFC1903. [19]. PacketCable Audio/Video Codecs Specification, PKT-SP-CODEC-I , December 1, 1999, Cable Television Laboratories, Inc., 38 CableLabs 12/01/99
45 PacketCable MTA Device Provisioning Specification [20]. PacketCable Provisioned QoS Specification, PKT-SP-PQoS-D , June 18, 1999, Cable Television Laboratories, Inc. [21]. PacketCable Dynamic Quality of Service Specification, PKT-SP-DQOS-I , Cable Television Laboratories, Inc., December 1, 1999, [22]. Operations Support System Interface Specification Radio Frequency Interface, spossi-rfi-i , Cable Television Laboratories, Inc., January 13, 1999, [23]. SIMPLE MAIL TRANSFER PROTOCOL, IETF RFC-821, August [24]. A Simple Network Management Protocol (SNMP), IETF RFC-1157, May [25]. Braden, R., Requirements for Internet Hosts -- Application and Support, IETF RFC-1123, October [26]. TFTP Timeout Interval and Transfer Size Options, IETF RFC-2349, May [27]. HTTP, IETF RFC1945, IETF RFC2068. [28]. An Architecture for Differentiated Services, IETF RFC-2475, December /01/99 CableLabs 39
46 PacketCable MTA Device Provisioning Specification Appendix C. Glossary AAA Access Control Active Admitted AF AH A-link Announcement Server Authentication, Authorization and Accounting Limiting the flow of information from the resources of a system only to authorized persons, programs, processes or other system resources on a network. A service flow is said to be active when it is permitted to forward data packets. A service flow must first be admitted before it is active. A service flow is said to be admitted when the CMTS has reserved resources (e.g. bandwidth) for it on the DOCSIS network. Assured Forwarding. A Diffserv Per Hop Behavior. Authentication header is an IPSec security protocol that provides message integrity for complete IP packets, including the IP header. A-Links are SS7 links that interconnect STPs and either SSPs or SCPs. A stands for Access. An announcement server plays informational announcements in PacketCable network. Announcements are needed for communications that do not complete and to provide enhanced information services to the user. AMA Asymmetric Key AT ATM Authentication Authenticity Authorization BAF Automated Message Accounting., a standard form of call detail records (CDRs) developed and administered by Bellcore (now Telcordia Technologies) An encryption key or a decryption key used in a public key cryptography, where encryption and decryption keys are always distinct. Access Tandem Asynchronous Transfer Mode. A protocol for the transmission of a variety of digital signals using uniform 53-byte cells. The process of verifying the claimed identity of an entity to another entity. The ability to ensure that the given information is without modification or forgery and was in fact produced by the entity who claims to have given the information. The act of giving access to a service or device if one has the permission to have the access. Bellcore AMA Format, another way of saying AMA BPI+ Baseline Privacy Interface Plus is the security portion of the DOCSIS 1.1 standard which runs on the MAC layer. CBC CBR CA CA Cipher block chaining mode is an option in block ciphers that combine (XOR) the previous block of ciphertext with the current block of plaintext before encrypting that block of the message. Constant Bit Rate. Certification Authority - a trusted organization that accepts certificate applications from entities, authenticates applications, issues certificates and maintains status information about certificates. Call Agent. In this specification Call Agent is part of the CMS that maintains the communication state, and controls the line side of the communication. 40 CableLabs 12/01/99
47 PacketCable MTA Device Provisioning Specification CDR CIC CID CIF Cipher Ciphersuite Ciphertext CIR Cleartext CM CMS CMS CMTS Codec Confidentiality COPS CoS CSR Cryptoanalysis Cryptographic algorithm DA DE Decipherment Decryption Decryption key DHCP DHCP-D Call Detail Record. A single CDR is generated at the end of each billable activity. A single billable activity may also generate multiple CDRs Circuit Identification Code. In ANSI SS7, a two octet number that uniquely identifies a DSO circuit within the scope of a single SS7 Point Code. Circuit ID (Pronounced Kid ). This uniquely identifies an ISUP DS0 circuit on a Media Gateway. It is a combination of the circuit s SS7 gateway point code and Circuit Identification Code (CIC). The SS7 DPC is associated with the Signaling Gateway that has domain over the circuit in question. Common Intermediate Format An algorithm that transforms data between plaintext and ciphertext. A set which must contain both an encryption algorithm and a message authentication algorithm (e.g. a MAC or an HMAC). In general, it may also contain a key management algorithm, which does not apply in the context of PacketCable. The (encrypted) message output from a cryptographic algorithm that is in a format that is unintelligible. Committed Information Rate. The original (unencrypted) state of a message or data. DOCSIS Cable Modem. Cryptographic Message Syntax Call Management Server. Controls the audio connections. Also called a Call Agent in MGCP/SGCP terminology. Cable Modem Termination System, the device at a cable head-end which implements the DOCSIS RFI MAC protocol and connects to CMs over an HFC network. COder-DECoder A way to ensure that information is not disclosed to any one other then the intended parties. Information is encrypted to provide confidentiality. Also known as privacy. Common Open Policy Service Protocol is currently an internet draft which describes a client/server model for supporting policy control over QoS Signaling Protocols and provisioned QoS resource management. Class of Service. The type 4 tuple of a DOCSIS 1.0 configuration file. Customer Service Representative The process of recovering the plaintext of a message or the encryption key without access to the key. An algorithm used to transfer text between plaintext and ciphertext. Directory Assistance Default. A Diffserv Per Hop Behavior. A procedure applied to ciphertext to translate it into plaintext. A procedure applied to ciphertext to translate it into plaintext. The key in the cryptographic algorithm to translate the ciphertext to plaintext Dynamic Host Configuration Protocol. DHCP Default - Network Provider DHCP Server 12/01/99 CableLabs 41
48 PacketCable MTA Device Provisioning Specification Digital certificate Digital signature DNS Downstream DSCP DOCSIS DPC DQoS DTMF EF E-MTA Encipherment Encryption Encryption Key Endpoint EO Errored Second ESP ETSI Event Message FGD A binding between an entity s public key and one or more attributes relating to its identity, also known as a public key certificate A data value generated by a public key algorithm based on the contents of a block of data and a private key, yielding an individualized cryptographic checksum Domain Name Server The direction from the head-end toward the subscriber location. Diffserv Code Point. A field in every IP packet which identifies the Diffserv Per Hop Behavior. In IP version 4, the TOS byte is redefined to be the DSCP. In IP version 6, the Traffic Class octet is used as the DSCP. See Appendix A. Data Over Cable System Interface Specification. Destination Point Code. In ANSI SS7, a 3 octet number which uniquely identifies an SS7 Signaling Point, either an SSP, STP, or SCP. Dynamic Quality of Service, i.e. assigned on the fly for each communication depending on the QoS requested Dual-tone Multi Frequency (tones) Expedited Forwarding. A Diffserv Per Hop Behavior. Embedded MTA a single node which contains both an MTA and a cable modem. A method used to translate information in plaintext into ciphertext. A method used to translate information in plaintext into ciphertext. The key used in a cryptographic algorithm to translate the plaintext to ciphertext. A Terminal, Gateway or MCU End Office Any 1-sec interval containing at least one bit error. IPSec Encapsulation Security Payload protocol that provides both IP packet encryption and optional message integrity, not covering the IP packet header. European Telecommunications Standards Institute Message capturing a single portion of a connection Feature Group D signaling F-link F-Links are SS7 links that directly connect two SS7 end points, such as two SSPs. F stands for Fully Associated Flow [IP Flow] A unidirectional sequence of packets identified by ISO Layer 3 and Layer 4 header information. This information includes source/destination IP addresses, source/destination port numbers, protocol ID. Multiple multimedia streams may be carried in a single IP Flow. Flow [DOCSIS Flow] FQDN Gateway (a.k.a. DOCSIS-QoS service flow ). A unidirectional sequence of packets associated with a SID and a QoS. Multiple multimedia streams may be carried in a single DOCSIS Flow. Fully Qualified Domain Name. Refer to IETF RFC 821 for details. Devices bridging between the PacketCable IP Voice Communication world and the PSTN. Examples are the Media Gateway which provides the bearer circuit interfaces to the PSTN and transcodes the media stream, and the Signaling Gateway which sends and receives circuit switched network signaling tot he edge of the PacketCable network. 42 CableLabs 12/01/99
49 PacketCable MTA Device Provisioning Specification H.323 An ISO standard for transmitting and controlling audio and video information. The H.323 standard requires the use of the H.225/H.245 protocol for communication control between a gateway audio/video endpoint and a gatekeeper function. Header Protocol control information located at the beginning of a protocol data unit. HFC H.GCP Hybrid Fiber/Coax(ial [cable]), HFC system is a broadband bi-directional shared media transmission system using fiber trunks between the head-end and the fiber nodes, and coaxial distribution from the fiber nodes to the customer locations. A protocol for media gateway control being developed by ITU. HMAC Hashed Message Authentication Code a message authentication algorithm, based on either SHA-1 or MD5 hash and defined in RFC HTTP Hyper Text Transfer Protocol. Refer to IETF RFC 1945 and RFC IANA IC IETF IKE IKE IKE+ Integrity IntraLATA IP IPSec ISDN ISUP ISTP ISTP User ITU IVR Jitter Kerberos Key Key Exchange Internet Assigned Numbered Authority. See for details. Inter-exchange Carrier Internet Engineering Task Force. A body responsible, among other things, for developing standards used in the Internet. Internet Key Exchange is a key management mechanism used to negotiate and derive keys for SAs in IPSec. A notation defined to refer to the use of IKE with pre-shared keys for authentication. A notation defined to refer to the use of IKE, which requires digital certificates for authentication. A way to ensure that information is not modified except by those who are authorized to do so. Within a Local Access Transport Area Internet Protocol. An Internet network-layer protocol. Internet Protocol Security, a collection of Internet standards for protecting IP packets with encryption and authentication. Integrated Services Digital Network ISDN User Part is a protocol within the SS7 suite of protocols that is used for call signaling within an SS7 network. Internet Signaling Transport Protocol Any element, node, or software process that uses the ISTP stack for signaling communications. International Telecommunication Union Interactive Voice Response System Variability in the delay of a stream of incoming packets making up a flow such as a voice communication. A secret-key network authentication protocol that uses a choice of cryptographic algorithms for encryption and a centralized key database for authentication. A mathematical value input into the selected cryptographic algorithm. The swapping of public keys between entities to be used to encrypt communication between the entities. 12/01/99 CableLabs 43
50 PacketCable MTA Device Provisioning Specification Key Management Keying Material Key Pair Keyspace LATA Latency LD LIDB Link Encryption LLC LNP LSSGR MAC MAC MC MD5 MDCP MDU MEGACO MG MGC MGCP MIB MIC MMC The process of distributing shared symmetric keys needed to run a security protocol. A set of cryptographic keys and their associated parameters, normally associated with a particular run of a security protocol. An associated public and private key where the correspondence between the two are mathematically related, but it is computationally infeasible to derive the private key from the public key. The range of all possible values of the key for a particular cryptographic algorithm. Local Access and Transport Area The time, expressed in quantity of symbols, taken for a signal element to pass through a device. Long Distance Line Information Data Base, containing information on customers required for real-time access such as calling card personal identification numbers (PINs) for real-time validation Cryptography applied to data as it travels on data links between the network devices. Logical Link Control, used here to mean the Ethernet Packet header and optional 802.1P tag which may encapsulate an IP packet. A sublayer of the Data Link Layer. Local Number Portability. Allows a customer to retain the same number when switching from one local service provider to another. LATA Switching Systems Generic Requirements Message Authentication Code - a fixed length data item that is sent together with a message to ensure integrity, also known as a MIC. Media Access Control. It is a sublayer of the Data Link Layer. It normally runs directly over the physical layer. Multipoint Controller Message Digest 5 - a one-way hash algorithm which maps variable length plaintext into fixed length (16 byte) ciphertext. A media gateway control specification submitted to IETF by Lucent. Now called SCTP. Multi-Dwelling Unit. Multiple units within the same physical building. The term is usually associated with high rise buildings Media Gateway Control IETF working group. See for details. The media gateway provides the bearer circuit interfaces to the PSTN and transcodes the media stream. An Media Gateway Controller is the overall controller function of the PSTN gateway. It receives, controls and mediates call signaling information between the PacketCable and PSTN. Media Gateway Control Protocol. Protocol follow on to SGCP. Management Information Base Message integrity code, a fixed length data item that is sent together with a message to ensure integrity, also known as a MAC. Multi-Point Mixing Controller. A conferencing device for mixing media 44 CableLabs 12/01/99
51 PacketCable MTA Device Provisioning Specification MSO MSU MTA MTP MWD NANP NANPNAT NAT Network Layer Network Layer Network Management Network Management OSS NCS Nonce Non-Repudiation NPA-NXX NTP NTSC Off-Net Call On-Net Call One-way Hash OSP OSS-D OSS streams of multiple connections. Multi-System Operator, a cable company that operates many head-end locations in several cities. Message Signal Unit Media Terminal Adapter contains the interface to a physical voice device, a network interface, CODECs, and all signaling and encapsulation functions required for VoIP transport, class features signaling, and QoS signaling. The Message Transfer Part is a set of two protocols (MTP 2, 3) within the SS7 suite of protocols that are used to implement physical, data link and network level transport facilities within an SS7 network. Maximum Waiting Delay North American Numbering Plan North American Numbering Plan Network Address Translation Network Address Translation Layer 3 in the Open System Interconnection (OSI) architecture; the layer that provides services to establish a path between open systems. Layer 3 in the Open System Interconnection (OSI) architecture that provides network information that is independent from the lower layers. The functions related to the management of data across the network. The functions related to the management of data link layer and physical layer resources and their stations across the data network supported by the hybrid fiber/coax system. Network Call Signaling A random value used only once which is sent in a communications protocol exchange to prevent replay attacks. The ability to prevent a sender from denying later that he or she sent a message or performed an action. Numbering Plan Area (more commonly known as area code) NXX (sometimes called exchange) represents the next three numbers of a traditional phone number. The N can be any number from 2-9 and the Xs can be any number. The combination of a phone number s NPA-NXX will usually indicate the physical location of the call device. The exceptions include tollfree numbers and ported number (see LNP) Network Time Protocol, an internet standard used for synchronizing clocks of elements distributed on an IP network National Television Standards Committee which defines the analog color television, broadcast standard used today in North America. A communication connecting a PacketCable subscriber out to a user on the PSTN A communication placed by one customer to another customer entirely on the PacketCable Network A hash function that has an insignificant number of collisions upon output. Operator Service Provider OSS Default Network Provider Provisioning Server Operations Systems Support. The back office software used for configuration, performance, fault, accounting and security management. 12/01/99 CableLabs 45
52 PacketCable MTA Device Provisioning Specification PAL PDU PKCS PKI PKINIT PHS Plaintext Pre-shared Key Privacy Private Key Proxy PSC PSFR PSTN Public Key Public Key Certificate Public Key Cryptography PCM QCIF QoS RADIUS Phase Alternate Line the European color television format which evolved from the American NTSC standard. Protocol Data Unit Public Key Cryptography Standards, published by RSA Data Security Inc. Describes how to use public key cryptography in a reliable, secure and interoperable way. Public Key Infrastructure - a process for issuing public key certificates, which includes standards, Certification Authorities, communication between authorities and protocols for managing certification processes. The extension to the Kerberos protocol that provides a method for using public key cryptography during initial authentication. Payload Header Suppression, a DOCSIS technique for compressing the Ethernet, IP and UDP headers of RTP packets. The original (unencrypted) state of a message or data. A shared secret key passed to both parties in a communication flow, using an unspecified manual or out-of-band mechanism. A way to ensure that information is not disclosed to any one other then the intended parties. Information is usually encrypted to provide confidentiality. Also known as confidentiality. The key used in public key cryptography that belongs to an individual entity and must be kept secret. A facility that indirectly provides some service or acts as a representative in delivering information there by eliminating a host from having to support the services themselves. Payload Service Class Table, a MIB table that maps RTP payload Type to a Service Class Name. Provisioned Service Flow Reference. An SFR that appears in the DOCSIS configuration file. Public Switched Telephone Network. The key used in public key cryptography that belongs to an individual entity and is distributed publicly. Other entities use this key to encrypt data to be sent to the owner of the key. A binding between an entity s public key and one or more attributes relating to its identity, also known as a digital certificate. A procedure that uses a pair of keys, a public key and a private key for encryption and decryption, also known as asymmetric algorithm. A user s public key is publicly available for others to use to send a message to the owner of the key. A users private key is kept secret and is the only key which can decrypt messages sent encrypted by the users public key. Pulse Code Modulation A commonly employed algorithm to digitize an analog signal (such as a human voice) into a digital bit stream using simple analog to digital conversion techniques. Quarter Common Intermediate Format Quality of Service, guarantees network bandwidth and availability for applications. Remote Access Dial-In User Service, an internet protocol (RFC 2138 and RFC 2139) originally designed for allowing users dial-in access to the internet through remote servers. Its flexible design has allowed it to be extended well 46 CableLabs 12/01/99
53 PacketCable MTA Device Provisioning Specification RAS RC4 RFC RFI RJ-11 RKS Root Private Key Root Public Key RSA Key Pair RSVP RTCP RTO RTP S-MTA SA SAID SCCP SCP SCTP SDP SDU Secret Key beyond its original intended use Registration, Admissions and Status. RAS Channel is an unreliable channel used to convey the RAS messages and bandwidth changes between two H.323 entities. A variable key length stream cipher offered in the ciphersuite, used to encrypt the media traffic in PacketCable. Request for Comments. Technical policy documents approved by the IETF which are available on the World Wide Web at The DOCSIS Radio Frequency Interface specification. Standard 4-pin modular connector commonly used in the United States for connecting a phone unit into the wall jack Record Keeping Server, the device which collects and correlates the various Event Messages The private signing key of the highest level Certification Authority. It is normally used to sign public key certificates for lower-level Certification Authorities or other entities. The public key of the highest level Certification Authority, normally used to verify digital signatures that it generated with the corresponding root private key. A public/private key pair created for use with the RSA cryptographic algorithm. Resource reservation Protocol Real Time Control Protocol Retransmission Timeout Real Time Protocol, a protocol defined in RFC 1889 for encapsulating encoded voice and video streams. Standalone MTA a single node which contains an MTA and a non DOCSIS MAC (e.g. ethernet). Security Association - a one-way relationship between sender and receiver offering security services on the communication flow. Security Association Identifier - uniquely identifies SAs in the BPI+ security protocol, part of the DOCSIS 1.1 specification. The Signaling Connection Control Part is a protocol within the SS7 suite of protocols that provides two functions in addition to those that are provided within MTP. The first is the ability to address applications within a signaling point. The second function is Global Title Translation. A Service Control Point is a Signaling Point within the SS7 network, identifiable by a Destination Point Code, that provides database services to the network. Simple Control Transmission Protocol. Session Description Protocol. Service Data Unit. Information that is delivered as a unit between peer service access points. The cryptographic key used in a symmetric key algorithm, which results in the secrecy of the encrypted data depending solely upon keeping the key a secret, also known as a symmetric key. 12/01/99 CableLabs 47
54 PacketCable MTA Device Provisioning Specification Session Key SF SFID SFR SG SGCP SHA 1 SID Signed and Sealed SIP SIP+ SNMP SOHO SPI SS7 SSP STP Subflow Symmetric Key Systems Management A cryptographic key intended to encrypt data for a limited period of time, typically between a pair of entities. Service Flow. A unidirectional flow of packets on the RF interface of a DOCSIS system. Service Flow ID, a 32-bit integer assigned by the CMTS to each DOCSIS Service Flow defined within a DOCSIS RF MAC domain. Any 32-bit SFID must not conflict with a zero-extended 14-bit SID. SFIDs are considered to be in either the upstream direction (USFID) or downstream direction (DSFID). USFIDs and DSFIDs are allocated from the same SFID number space. Service Flow Reference, a 16-bit message element used within the DOCSIS TLV parameters of Configuration Files and Dynamic Service messages to temporarily identify a defined Service Flow. The CMTS assigns a permanent SFID to each SFR of a message. Signaling Gateway. An SG is a signaling agent that receives/sends SCN native signaling at the edge of the IP network. In particular the SS7 SG function translates variants ISUP and TCAP in an SS7-Internet Gateway to a common version of ISUP and TCAP. Simple Gateway Control Protocol. Earlier draft of MGCP. Secure Hash Algorithm 1 - a one-way hash algorithm. Service ID. A 14-bit number assigned by a CMTS to identify an upstream virtual circuit. Each SID separately requests and is granted the right to use upstream bandwidth. An envelope of information which has been signed with a digital signature and sealed by using encryption. Session Initiation Protocol is an application layer control (signaling) protocol for creating, modifying and terminating sessions with one or more participants. Session Initiation Protocol Plus is an extension to SIP. Simple Network Management Protocol Small Office/Home Office Security Parameters Index - a field in the IPSEC header that along with the destination IP address provides a unique number for each SA. Signaling System Number 7. SS7 is an architecture and set of protocols for performing out-of-band call signaling with a telephone network. Signal Switching Point. SSPs are points within the SS7 network that terminate SS7 signaling links and also originate, terminate, or tandem switch calls. Signal Transfer Point. An STP is a node within an SS7 network that routes signaling messages based on their destination address. It is essentially a packet switch for SS7. It may also perform additional routing services such as Global Title Translation. A unidirectional flow of IP packets characterized by a single source and destination IP address and source and destination UDP/TCP port. The cryptographic key used in a symmetric key algorithm, which results in the secrecy of the encrypted data depending solely upon keeping the key a secret, also known as a secret key. Functions in the application layer related to the management of various open systems Interconnection (OSI) resources and their status across all layers of the OSI architecture. 48 CableLabs 12/01/99
55 PacketCable MTA Device Provisioning Specification TCAP TCP TD TFTP TFTP-D TGS TGW TIPHON TLV TN ToD TOS Transit Delays Trunk TSG Tunnel Mode UDP Upstream VAD VBR VoIP Transaction Capabilities Application Protocol. A protocol within the SS7 stack that is used for performing remote database transactions with a Signaling Control Point. Transmission Control Protocol Timeout for Disconnect Trivial File Transfer Protocol Default Trivial File Transfer Protocol Ticket Granting Server used to grant Kerberos tickets. Telephony Gateway Telecommunications & Internet Protocol Harmonization Over Network. Type-Length-Value tuple within a DOCSIS configuration file. Telephone Number Time of Day Server Type of Service. An 8-bit field of every IP version 4 packet. In a Diffserv domain, the TOS byte is treated as the Diffserv Code Point, or DSCP. The time difference between the instant at which the first bit of a PDU crosses one designated boundary, and the instant at which the last bit of the same PDU crosses a second designated boundary. An analog or digital connection from a circuit switch which carries user media content and may carry voice signaling (MF, R2, etc.). Trunk Subgroup An IPSEC (ESP or AH) mode that is applied to an IP tunnel, where an outer IP packet header (of an intermediate destination) is added on top of the original, inner IP header. In this case, the ESP or AH transform treats the inner IP header as if it were part of the packet payload. When the packet reaches the intermediate destination, the tunnel terminates and both the outer IP packet header and the IPSEC ESP or AH transform are taken out. User Datagram Protocol, a connectionless protocol built upon Internet Protocol (IP). The direction from the subscriber location toward the head-end. Voice Activity Detection Variable bit-rate Voice over IP WBEM Web-Based Enterprise Management (WBEM) is the umbrella under which the DMTF (Desktop Management Task Force) will fit its current and future specifications. The goal of the WBEM initiative is to further management standards using Internet technology in a manner that provides for interoperable management of the Enterprise. There is one DMTF standard today within WBEM and that is CIM (Common Information Model). WBEM compliance means adhering to the CIM. See X.509 certificate a public key certificate specification developed as part of the ITU-T X.500 standards directory 12/01/99 CableLabs 49
56 PacketCable MTA Device Provisioning Specification Appendix D. Revisions Engineering Change Numbers ECN Date Ratified Summary 50 CableLabs 12/01/99
ETSI TS 101 909-6 V1.1.1 (2001-06)
TS 101 909-6 V1.1.1 (2001-06) Technical Specification Access and Terminals (AT); Digital Broadband Cable Access to the Public Telecommunications Network; IP Multimedia Time Critical Services; Part 6: Media
Provisioning of VoIP Phones
Provisioning of VoIP Phones ipdialog, Inc. Phone (408) 451-1430 1430 1762 Technology Drive Suite 124 Fax (408) 451-1440 1440 San Jose CA 95110-1307 1307 USA URL www.ipdialog.com Joon Maeng, [email protected]
Data Over Cable Interface Specifications. Cable Modem Termination System Network Side Interface Specification SP-CMTS-NSII01-960702
Data Over Cable Interface Specifications Cable Modem Termination System Network Side Interface Specification SP-CMTS-NSII01-960702 INTERIM SPECIFICATION Notice This interface specification was prepared
Device Provisioning in Cable Environments
A white paper by Incognito Software March, 2009 2009 Incognito Software Inc. All rights reserved. Page 1 of 8 Introduction... 2 Auto-Provisioning and Pre-Provisioning... 2 Components Involved in Device
ENGINEERING COMMITTEE
ENGINEERING COMMITTEE (Data Standards Subcommittee) AMERICAN NATIONAL STANDARD ANSI/SCTE 79-3 2011 DOCSIS 2.0 + IPv6 Cable Modem Standard NOTICE The Society of Cable Telecommunications Engineers (SCTE)
Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work
Cable Modems Definition Cable modems are devices that allow high-speed access to the Internet via a cable television network. While similar in some respects to a traditional analog modem, a cable modem
ITU-T RECOMMENDATION J.122, SECOND-GENERATION TRANSMISSION SYSTEMS FOR INTERACTIVE CABLE TELEVISION SERVICES IP CABLE MODEMS
ORGANIZATION OF AMERICAN STATES INTER-AMERICAN TELECOMMUNICATION COMMISSION PERMANENT CONSULTATIVE COMMITTEE I: TELECOMMUNICATION STANDARDIZATION Standards Coordination Document Nr. 10: ITU-T RECOMMENDATION
How To Issue A Certificate On A Cablelabs Device (Cablelabs) To A Certificate Request Agent (Cra)
CableLabs Certificate Issuance Process Notice This document is furnished by Cable Television Laboratories, Inc. (CableLabs) in an AS IS basis. CableLabs does not provide any representation or warranty,
Management of Converging Networks
Greater Chicago Chapter Thursday, 9-21-00 of Converging Networks Paul T. Schauer, PE Lucent Technologies Agenda Converging Networks Why Network? What Is Network? Network for CATV 2 Converging Networks
Security Criteria for Service Delivery Network
CableLabs Specifications ISSUED Notice This specification is the result of a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. for the benefit of the cable industry
BROADSOFT PARTNER CONFIGURATION GUIDE VEGASTREAM VEGA 100
BROADSOFT PARTNER CONFIGURATION GUIDE VEGASTREAM VEGA 100 JULY 2005 Version 1.0 BroadWorks Guide Copyright Notice Copyright 2005 BroadSoft, Inc. All rights reserved. Any technical documentation that is
Key Elements of a Successful SIP Device Provisioning System
Key Elements of a Successful SIP Device Provisioning System A white paper by Incognito Software April, 2006 2006 Incognito Software Inc. All rights reserved. Page 1 of 6 Key Elements of a Successful SIP
The Recommended Testing Process for PacketCableTM Voice Service at a Customer Premises
The Recommended Testing Process for PacketCableTM Voice Service at a Customer Premises The current generation of cable systems supports voice, video, and data services. Video and data services have been
Cisco Prime Cable Provisioning 5.0
Data Sheet Cisco Prime Cable Provisioning 5.0 Cable service providers face tremendous challenges in keeping pace with the rapid evolution of residential subscriber services. In light of intense market
ETSI TS 103 161-12 V1.1.1 (2011-10)
TS 103 161-12 V1.1.1 (2011-10) Technical Specification Access, Terminals, Transmission and Multiplexing (ATTM); Integrated Broadband Cable and Television Networks; IPCablecom 1.5; Part 12: Management Event
Broadband Cable Service Deployment at WorldCall Telecom - Pakistan. Hassan Zaheer Manager Operations Broadband Division
Broadband Cable Service Deployment at WorldCall Telecom - Pakistan Hassan Zaheer Manager Operations Broadband Division Broadband Cable Cable services provides Intelligent network Mix of IP and MPEG Multiple
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Cisco Expressway Basic Configuration
Cisco Expressway Basic Configuration Deployment Guide Cisco Expressway X8.1 D15060.03 August 2014 Contents Introduction 4 Example network deployment 5 Network elements 6 Internal network elements 6 DMZ
Developing Higher Density Solutions with Dialogic Host Media Processing Software
Telecom Dialogic HMP Media Server Developing Higher Density Solutions with Dialogic Host Media Processing Software A Strategy for Load Balancing and Fault Handling Developing Higher Density Solutions with
PacketCable 1.0 Architecture Framework Technical Report
PacketCable 1.0 Architecture Framework Technical Report Notice This PacketCable technical report is a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. (CableLabs )
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
BroadSoft Partner Configuration Guide
BroadSoft Partner Configuration Guide Grandstream GXW-400X FXS Analog Gateway & HandyTone HT-50X Analog Telephone Adapter April 2007 Document Version 1.1 BroadWorks Guide Copyright Notice Copyright 2007
7750 SR OS System Management Guide
7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted
Implementing Intercluster Lookup Service
Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end
Application Protocols for TCP/IP Administration
Application Protocols for TCP/IP Administration BootP, TFTP, DHCP Agenda BootP TFTP DHCP BootP, TFTP, DHCP, v4.4 2 Page 60-1 BootP (RFC 951, 1542, 2132) BootP was developed to replace RARP capabilities
This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.
This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1. WASv61_SIP_overview.ppt Page 1 of 27 This presentation will provide an overview of
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
Configuring H.323 over Port Network Address Translation (PNAT) for Avaya IP Endpoints using the Avaya SG200 Security Gateway - Issue 1.
Configuring H.323 over Port Network Address Translation (PNAT) for Avaya IP Endpoints using the Avaya SG200 Security Gateway - Issue 1.0 Abstract These Application Notes describe how to configure the Avaya
Configuration Notes 0215
Mediatrix Digital and Analog VoIP Gateways DNS SRV Configuration for a Redundant Server Solution (SIP) Introduction... 2 Deployment Scenario... 2 DNS SRV (RFC 2782)... 3 Microsoft Server Configuration...
Mediatrix 4404 Step by Step Configuration Guide June 22, 2011
Mediatrix 4404 Step by Step Configuration Guide June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents First Steps... 3 Identifying your MAC Address... 3 Identifying your Dynamic IP Address...
Chapter 8 Advanced Configuration
Chapter 8 Advanced Configuration This chapter describes how to configure the advanced features of your ProSafe 802.11g Wireless VPN Firewall FVG318. Configuring Dynamic DNS If your network has a permanently
VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide
VOIP-211RS/210RS/220RS/440S SIP VoIP Router User s Guide Trademarks Contents are subject to revise without prior notice. All trademarks belong to their respective owners. FCC Warning This equipment has
Capacity Management in Multimedia Networks. Presented at SCTE Emerging Technologies 2005
Capacity Management in Multimedia Networks Ben Ben Bekele Bekele Jason Jason Schnitzer Schnitzer Senior DOCSIS Engineer Chief OSS Architect Principal Cox Cox Communications YAS Broadband Applied Ventures
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All
Product Standard General Interworking: Internet Server
General Interworking: Internet Server The Open Group Copyright August 1998, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted,
Configuring a SIP Trunk between Avaya Aura Session Manager Release 6.1 and Avaya Communication Server 1000E Release 7.5 Issue 1.0
Avaya Solution Interoperability Test Lab Configuring a SIP Trunk between Avaya Aura Session Manager Release 6.1 and Avaya Communication Server 1000E Release 7.5 Issue 1.0 Abstract These Application Notes
SNMP -overview. Based on: W.Stallings Data and Computer Communications
SNMP -overview Based on: W.Stallings Data and Computer Communications Network Management -SNMP Simple Network Management Protocol (not so simple ) Dominant standardized network management scheme in use
Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement
Prestige 310 Cable/xDSL Modem Sharing Router User's Guide Supplement Domain Name Support Enhanced WAN Setup Remote Node Support PPPoE Support Enhanced Unix Syslog Setup Firmware and Configuration Files
Advanced DOCSIS Set-Top Gateway Implementation Design Guide for System Release 5.0
Advanced DOCSIS Set-Top Gateway Implementation Design Guide for System Release 5.0 Overview Overview Introduction Direct ADSG (Advanced DOCSIS * Set-top Gateway) allows system operators to set up their
Requirements & Reference Models for ADSL Access Networks: The SNAG Document
Technical Report TR-010 Requirements & Reference Models for ADSL Access Networks: The SNAG Document June 1998 Abstract: This document outlines architectural requirements and reference models for ADSL services
Application Notes for the Ingate SIParator with Avaya Converged Communication Server (CCS) - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for the Ingate SIParator with Avaya Converged Communication Server (CCS) - Issue 1.0 Abstract These Application Notes describe the configuration
Technical Configuration Notes
MITEL SIPCoE Technical Configuration Notes Configure Inn-Phone SIP Phone for use with MCD SIP CoE NOTICE The information contained in this document is believed to be accurate in all respects but is not
Configure Cisco Unified Customer Voice Portal
Cisco Unified Customer Voice Portal Configuration, page 1 Configure Gateways, page 1 Transfer Unified CVP Scripts and Media Files, page 2 Unified Customer Voice Portal Licenses, page 2 Configure SNMP,
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
Provisioning Cable Services
CHAPTER 10 This chapter describes how to provision MPLS VPN cable in IP Solutions Center (ISC). It contains the following sections: Overview of MPLS VPN Cable, page 10-1 in ISC, page 10-5 Creating the
Administrator's Guide
Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...
SIP: Protocol Overview
SIP: Protocol Overview NOTICE 2001 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd. and are protected by United States copyright laws, other applicable copyright
Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures
MS Windows DHCP Server Configuration
MS Windows DHCP Server Configuration Abstract This document describes how to configure option 43 on a Microsoft Windows 2000/2003 DHCP server. This information may be used in an Aruba Networks solution
1 SIP Carriers. 1.1 Tele2. 1.1.1 Warnings. 1.1.2 Vendor Contact. 1.1.3 Versions Verified SIP Carrier status as of Jan 1, 2011. 1.1.
1 SIP Carriers 1.1 Tele2 1.1.1 Warnings Check the SIP 3 rd Party SIP Carrier Matrix for certification status, and supported features. More info about the SIP 3 rd Party SIP Carrier Matrix can be found
Application notes for SIPERA UC-Sec 4.0 Remote User Enablement Solution with Avaya Multimedia Communication System 5100 release 4.0 Issue 1.
Avaya Solution & Interoperability Test Lab Application notes for SIPERA UC-Sec 4.0 Remote User Enablement Solution with Avaya Multimedia Communication System 5100 release 4.0 Issue 1.0 Abstract These Application
Ajay Gummalla-July 2001
DOCSIS Overview Ajay Gummalla Ethernet in the First Mile Study Group July 2001 Ajay Gummalla-July 2001 1 HFC Plant Topology VIDEO combiner Fiber TX Fiber Fiber RX Tap CMTS Fiber RX Fiber Fiber TX 2way
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
System i and System p. Customer service, support, and troubleshooting
System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,
NQA Technology White Paper
NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics
Tech Note Cisco IOS SNMP Traps Supported and How to Conf
Tech Note Cisco IOS SNMP Traps Supported and How to Conf Table of Contents Cisco IOS SNMP Traps Supported and How to Configure Them...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya
Application Notes for Configuring Alternate Methods of Domain Based Routing for Outbound SIP Calls with the Avaya SIP Trunk Architecture Issue 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Alternate Methods of Domain Based Routing for Outbound SIP Calls with the Avaya SIP Trunk Architecture Issue 1.0 Abstract These
Application Notes for Configuring Yealink T-22 SIP Phones to interoperate with Avaya IP Office - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Yealink T-22 SIP Phones to interoperate with Avaya IP Office - Issue 1.0 Abstract These Application Notes describe the configuration
Time Warner ITSP Setup Guide
October 14 Time Warner ITSP Setup Guide Author: Zultys Technical Support This configuration guide was created to assist knowledgeable vendors with configuring the Zultys MX Phone System with Time Warner
VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service
VoIP Architecture VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service Marcin Godlewski Lead Engineer Scientific Atlanta, a Cisco Company Charles Moreman
Saving Time & Money Across The Organization With Network Management Simulation
Saving Time & Money Across The Organization With Network Management Simulation May, 2011 Copyright 2011 SimpleSoft, Inc. All Rights Reserved Introduction Network management vendors are in business to help
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.
Name: 1. What is an Enterprise network and how does it differ from a WAN? 2.,,,, and are key services that ISPs can provide to all customers. 3. Describe in detail what a managed service that an ISP might
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
6.40A AudioCodes Mediant 800 MSBG
AudioCodes Mediant 800 MSBG Page 1 of 66 6.40A AudioCodes Mediant 800 MSBG 1. Important Notes Check the SIP 3 rd Party Validation Website for current validation status. The SIP 3 rd party Validation Website
Integrating VoIP Phones and IP PBX s with VidyoGateway
Integrating VoIP Phones and IP PBX s with VidyoGateway Updated February 2011 INDEX: I. ABSTRACT.1 II. III. IV. VIDYOGATEWAY OVERVIEW.. 1 NETWORK TOPOLOGIES AND DEFINITIONS...2 CONNECTING TO VIDYOCONFERENCES
nexvortex SIP Trunking
nexvortex SIP Trunking January 2015 510 SPRING STREET HERNDON VA 20170 +1 855.639.8888 Copyright nexvortex 2014 This document is the exclusive property of nexvortex, Inc. and no part may be disclosed,
Installing, Uninstalling, and Upgrading Service Monitor
CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page
Application Notes for Avaya Aura Conferencing 7.2 and Radvision SCOPIA Elite MCU Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Avaya Aura Conferencing 7.2 and Radvision SCOPIA Elite MCU Issue 1.0 Abstract These Application Notes describe the configuration of Avaya
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
Networked AV Systems Pretest
Networked AV Systems Pretest Instructions Choose the best answer for each question. Score your pretest using the key on the last page. If you miss three or more out of questions 1 11, consider taking Essentials
Cisco TelePresence Video Communication Server Basic Configuration (Control with Expressway)
Cisco TelePresence Video Communication Server Basic Configuration (Control with Expressway) Deployment Guide Cisco VCS X8.1 D14651.08 August 2014 Contents Introduction 4 Example network deployment 5 Network
Configuring SIP Trunking and Networking for the NetVanta 7000 Series
61200796L1-29.4E July 2011 Configuration Guide Configuring for the NetVanta 7000 Series This configuration guide describes the configuration and implementation of Session Initiation Protocol (SIP) trunking
ETSF10 Part 3 Lect 2
ETSF10 Part 3 Lect 2 DHCP, DNS, Security Jens A Andersson Electrical and Information Technology DHCP Dynamic Host Configuration Protocol bootp is predecessor Alternative: manual configuration IP address
Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula
Section 11.1, Simple Network Management Protocol. Section 11.2, Port Data Capture
Chapter 11 SNMP and Port Data Capture This module discusses the Simple Network Management Protocol (SNMP) and the BANDIT device s Port Data Capture feature, and how they can be used to augment or enhance
Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia for Business Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E50 Configuring connection settings Nokia E50 Configuring connection settings Legal Notice Copyright
Written examination in Computer Networks
Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between the Verizon Business VoIP Service with IP Trunking and Avaya Communication Manager Branch Edition Issue
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client
A P P L I C A T I O N N O T E Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client This application note describes how to set up a VPN connection between a Mac client and a Sidewinder
Simple Network Management Protocol
56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange
Channel Bonding in DOCSIS 3.0. Greg White Lead Architect Broadband Access CableLabs
Channel Bonding in DOCSIS 3.0 Greg White Lead Architect Broadband Access CableLabs Agenda DS Channel Bonding Protocol Receive Channel Profiles US Channel Bonding Protocol HFC Plant Topologies & Resolution
eco PDU PE Series SNMP Settings User Instructions
eco PDU PE Series SNMP Settings User Instructions www.aten.com NRGence User Help User Information Online Registration Be sure to register your product at our online support center: International North
Cisco CNR and DHCP FAQs for Cable Environment
Table of Contents CNR and DHCP FAQs for Cable Environment...1 Questions...1 Introduction...1 Q. How do I access CNR remotely?...1 Q. How do I access CNR remotely if the CNR server is behind a firewall?...2
Copyright and Trademarks. How to Use this Guide. Phone Adapter with Router
Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
Comparison of SNMP. Versions 1, 2 and 3
Comparison of SNMP 1 Comparison of SNMP Versions 1, 2 and 3 Eddie Bibbs Brandon Matt ICTN 4600-001 Xin Tang April 17, 2006 Comparison of SNMP 2 During its development history, the communities of researchers,
Wireless Local Area Networks (WLANs)
4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................
Simple Network Management Protocol
CHAPTER 4 This chapter gives an overview of (SNMP). It contains the following sections: Overview, page 4-1 SNMP Versioning, page 4-2 SNMP and Cisco Unified CM Basics, page 4-3 SNMP Basic Commands, page
Protecting the Home Network (Firewall)
Protecting the Home Network (Firewall) Basic Tab Setup Tab DHCP Tab Advanced Tab Options Tab Port Forwarding Tab Port Triggers Tab DMZ Host Tab Firewall Tab Event Log Tab Status Tab Software Tab Connection
Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0 Abstract These Application Notes describe the procedures for configuring
LifeSize Video Communications Systems Administrator Guide
LifeSize Video Communications Systems Administrator Guide November 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made
