Cisco Broadband Access Center 3.8
Administrator Guide
April 02, 2013
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-27172-01
Download from Www.Somanuals.com. All Manuals Search And Download.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
iii
Download from Www.Somanuals.com. All Manuals Search And Download.
Contents
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
iv
Download from Www.Somanuals.com. All Manuals Search And Download.
Contents
Overview 5-1
Parameters 5-6
Notification 5-8
Prerequisites 5-9
Expressions 5-11
MaintenanceWindow 5-11
Overview 6-1
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
v
Download from Www.Somanuals.com. All Manuals Search And Download.
Contents
InternalFirmwareFile 6-10
ExternalFirmwareFile 6-11
Overview 7-1
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
vi
Download from Www.Somanuals.com. All Manuals Search And Download.
Contents
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
vii
Download from Www.Somanuals.com. All Manuals Search And Download.
Contents
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
viii
Download from Www.Somanuals.com. All Manuals Search And Download.
Contents
Overview 13-1
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
ix
Download from Www.Somanuals.com. All Manuals Search And Download.
Contents
Overview 14-1
Administrator 16-1
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
x
Download from Www.Somanuals.com. All Manuals Search And Download.
Contents
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
xi
Download from Www.Somanuals.com. All Manuals Search And Download.
Contents
Overview 18-1
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
xii
Download from Www.Somanuals.com. All Manuals Search And Download.
Contents
Logging 21-2
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
xiii
Download from Www.Somanuals.com. All Manuals Search And Download.
Contents
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
xiv
Download from Www.Somanuals.com. All Manuals Search And Download.
Preface
The Cisco Broadband Access Center 3.8 Administrator Guide describes concepts and configurations
related to Cisco Broadband Access Center, which is called Cisco BAC throughout this guide.
This chapter provides an outline of the other chapters in this guide, detailed information about related
documents that support this Cisco BAC release, and demonstrates the styles and conventions used in the
guide.
Note
This document is to be used in conjunction with the documentation listed in Product Documentation,
This chapter contains the following information:
•
•
•
•
•
•
Audience
The Cisco Broadband Access Center 3.8 Administrator Guide is written for system administrators
involved in automating large-scale provisioning for broadband access. The network administrator should
be familiar with these topics:
•
•
Basic networking concepts and terminology.
Network administration.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
xv
Download from Www.Somanuals.com. All Manuals Search And Download.
Preface
Organization
This guide includes the following chapters:
Chapter
Title
Description
Describes the systems architecture implemented
in this Cisco BAC release.
Provides checklists to follow when configuring
Cisco BAC for use.
Provides an overview of CPE management and
describes key concepts supported within Cisco
BAC.
Describes the configuration templates that Cisco
BAC supports, and how to author custom
configuration templates.
Describes the firmware management feature that
Cisco BAC supports.
Describes the use of Parameter Dictionaries.
Describes how to troubleshoot CPE, using device
information, made available through Cisco BAC.
Describes the various options that help manage
Cisco BAC.
Describes how to manage and maintain the RDU
database.
Describes how to configure the CWMP service for
use with Cisco BAC.
Cisco BAC.
Describes the operations that you can perform on
the device using Cisco BAC.
Describes how to access Cisco BAC using the
administrator user interface.
Describes administration activities, including
searching for and viewing device information.
Describes the configuration activities that are
performed using the Cisco BAC administrator
application.
Describes DPE scriptable extension framework
which facilitates creating extension scripts,
adding extension scripts in Cisco BAC, and
verifying the script status in the DPE.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
xvi
Download from Www.Somanuals.com. All Manuals Search And Download.
Preface
Chapter
Title
Description
Describes the RDU TCP connection management,
RDU batch concurrency and RDU DPE
synchronization.
Describes Cisco BAC tools intended to help
configure, maintain speed, and improve the
installation, deployment, and use of Cisco BAC.
Describes how to troubleshoot Cisco BAC
servers.
Defines terminology used in this guide and
generally applicable to the technologies being
discussed.
Conventions
This document uses the following conventions:
Convention Indication
bold font
italic font
Commands and keywords and user-entered text appear in bold font.
Document titles, new or emphasized terms, and arguments for which you supply
values are in italic font.
[ ]
Elements in square brackets are optional.
{x | y | z }
Required alternative keywords are grouped in braces and separated by
vertical bars.
[ x | y | z ]
string
Optional alternative keywords are grouped in brackets and separated by
vertical bars.
A nonquoted set of characters. Do not use quotation marks around the string or
the string will include the quotation marks.
courier font
< >
Terminal sessions and information the system displays appear in courierfont.
Nonprinting characters such as passwords are in angle brackets.
Default responses to system prompts are in square brackets.
[ ]
!, #
An exclamation point (!) or a pound sign (#) at the beginning of a line of code
indicates a comment line.
Note
Means reader take note.
Caution
Means reader be careful. In this situation, you might perform an action that could result in equipment
damage or loss of data.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
xvii
Download from Www.Somanuals.com. All Manuals Search And Download.
Preface
Product Documentation
Note
We sometimes update the printed and electronic documentation after original publication. Therefore,
You can view the marketing and user documents for Cisco Broadband Access Center at:
The following document gives you the list of user documents for Cisco Broadband Access Center 3.8:
Related Documentation
Note
We sometimes update the printed and electronic documentation after original publication. Therefore,
The following document gives you the list of user documents for Cisco Prime Network Registrar 8.1:
The following document gives you the list of user documents for Cisco Access Registrar 5.0:
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional
information, see What’s New in Cisco Product Documentation at:
Subscribe to What’s New in Cisco Product Documentation, which lists all new and revised Cisco technical
documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The
RSS feeds are a free service.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
xviii
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
1
Broadband Access Center Overview
This chapter provides an overview of Cisco Broadband Access Center (Cisco BAC).
Cisco BAC automates the tasks of provisioning and managing customer premises equipment (CPE) in a
broadband service provider network.
With the high-performance capabilities of Cisco BAC, you can scale the product to suit networks of
virtually any size, even those with millions of CPE. It also offers high availability, made possible by the
product’s distributed architecture and centralized management.
Cisco BAC supports provisioning and managing of CPE by using the Broadband Forum’s CPE WAN
Management Protocol (CWMP), a standard defined in the TR-069 specification. Cisco BAC integrates
the capabilities defined in TR-069 to increase operator efficiency and reduce network-management
problems.
Cisco BAC supports devices based on the TR-069, TR-098, TR-104, TR-106, TR-181, and TR-196
standards. These devices include Ethernet and ADSL gateway devices, wireless gateways, VoIP ATAs,
and other devices compliant with CWMP. Cisco BAC also provides for runtime-extensible data models
to support any upcoming data-model standards or any vendor-specific data models based on CWMP.
Cisco BAC provides such critical features as redundancy and failover. Cisco BAC can be integrated into
new or existing environments through the use of a provisioning application programming interface (API)
that lets you control how Cisco BAC operates.
You can use the provisioning API to register devices in Cisco BAC, assign device configuration policies,
execute any CWMP operations on the CPE, and configure the entire Cisco BAC provisioning system.
This chapter includes the following sections:
•
•
Features and Benefits
Cisco BAC helps service providers provision and manage the rapidly expanding number of home
networking devices.
Cisco BAC supports mass-scale provisioning and managing of Femtocell Access Point (FAP) devices
that function as mini 3G cell tower in customer premises and backhaul call using the customer’s internet
connection. Apart from supporting the FAP devices, Cisco BAC also supports provisioning and
managing of Digital Life Controller (DLC) devices based on TR-069 protocol.
This section describes the basic features and benefits that the Cisco BAC architecture offers:
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
1-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 1 Broadband Access Center Overview
Features and Benefits
•
Configuration management: Vastly simplified in Cisco BAC through configuration templates, which
provide an easy, yet flexible mechanism to assign configurations for CPE. You can use the
template-processing mechanism to customize configurations for millions of devices by using a small
number of templates.
By using these XML-based templates, you can set configuration parameters and values, and
notification and access controls on a device. Configuration templates allow:
–
Conditionals, to include or exclude sections of a template based on, among others, Cisco BAC
property values.
–
–
–
Includes, to include template content from other files.
Parameter substitution, to substitute Cisco BAC property values into template parameters.
Prerequisites, to evaluate whether the template is applicable to a device at given time.
•
•
Firmware management: Maintaining and distributing sets of firmware image files to corresponding
CPE through the Cisco BAC system. A firmware rules template, associates the firmware image files
to groups of devices. Cisco BAC uses the rules in the associated firmware rules template to evaluate
the firmware that is downloaded to the device.
Using the firmware management feature, you can view firmware information on devices, add
firmware images to the database, and apply the image files to specific CPE.
Massive scalability: Enhanced by partitioning CPE into provisioning groups; each provisioning
group is responsible for only a subset of the CPE. A provisioning group is designed to be a logical
(typically geographic) grouping of servers, usually consisting of one or more Device Provisioning
Engines (DPEs).
A single provisioning group can handle the provisioning needs of up to 500,000 devices. As the
number of devices grows past 500,000, you can add additional provisioning groups to the
deployment.
•
Standards-based security: Cisco BAC is designed to provide a high degree of security by using
CWMP, outlined in the TR-069 standard. The CWMP security model is also designed to be scalable.
It is intended to allow basic security to accommodate less robust CPE implementations, while
allowing greater security for those that can support more advanced security mechanisms.
Cisco BAC integrates the Secure Sockets Layer (SSL) version 3.0 and the Transport Layer Security
(TLS) version 1.0 protocols into its CWMP ACS implementation. By using HTTP over SSL/TLS
(also known as HTTPS), Cisco BAC provides confidentiality and data integrity, and allows
certificate-based authentication between the various components.
•
Easy integration with back-end systems, using Cisco BAC mechanisms such as:
–
–
–
The Cisco BAC Java API, which can be used to perform all provisioning and management
operations.
The Cisco BAC publishing extensions, which are useful in writing RDU data into another
database.
The Cisco BAC Data Export tool, with which you can write device information from the Cisco
BAC system to a file.
–
–
The SNMP agent, which simplifies integration for monitoring Cisco BAC.
The DPE command line interface, which simplifies local configuration when you use it to copy
and paste commands.
•
Extensive server management: Cisco BAC provides extensive server performance statistics, thereby
enabling monitoring and troubleshooting.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
1-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 1 Broadband Access Center Overview
Supported Technology
•
Device diagnostics and troubleshooting: You use this feature to focus on a single device and collect
diagnostics information for further analysis. Cisco BAC provides several features to assist
diagnosis:
–
–
–
–
Device history—Provides a detailed history of significant events that occur in a device
provisioning lifecycle.
Device faults—Detects devices with recurring faults, which can cause bottlenecks and affect
network performance.
Device troubleshooting—Provides detailed records of device interactions with Cisco BAC
servers for a set of devices that are designated for such troubleshooting.
Direct device operations—Operations such as IP Ping and Get Live Data can be run on the
device for more insight.
•
•
Multi-instance object support: This feature introduces support for discovering and updating the CPE
parameters associated with multiple object instances, without specifying the actual instance number.
The multi-instance object support in the template, adds the flexibility to apply the configuration on
selective object instances.
Scriptable framework: This feature introduces the scriptable extension service which facilitates
running the Java scripts based DPE extensions. This feature also provides the support to load and
unload the extensions dynamically without restarting the DPE.
Supported Technology
This Cisco BAC release supports the provisioning and managing of CPE only through CWMP, outlined
in the TR-069 specification. However, virtually any data models based on TR-069, TR-098, TR-104,
TR-106, TR-181, and TR-196 extensions are supported.
CWMP Technology
TR-069 is a standard for remote management of CPE. This standard defines CWMP, which enables
communication between CPE and an autoconfiguration server (ACS).
CWMP details a mechanism that increases operator efficiency and reduces network management
problems through its primary capabilities. These capabilities include:
•
•
•
•
Autoconfiguration
Firmware Management
Status and Performance Monitoring
Device Diagnostics and Troubleshooting
In addition to CWMP, the TR-069 specification defined a version 1.0 of the data model for Internet
Gateway Device (IGD), which has since been expanded by TR-098. CWMP, as defined in TR-069, works
with any data model extended from CWMP, including those defined in TR-098, TR-104, TR-106,
TR-181, and TR-196, upcoming new ones, or those that are vendor specific.
TR-196
TR-196 standard provides the data model for the Femto Access Point (FAP) for remote management
purposes using the TR-069 CWMP.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
1-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 1 Broadband Access Center Overview
Supported Technology
The Cisco BAC template-based mechanism to assign configurations for devices is enhanced to support
the TR-196 devices in the service provider's network. Cisco BAC provides two additional parameter
dictionary files to support the following TR-196 data models:
•
•
TR-196 Amendment 1
TR-196 Issue 2 and TR-181 Issue 2 Amendment 2
Cisco BAC also provides a Generally Available (GA) scriptable extensions targeting residential 3G
features of above TR-196 data models. You can use the corresponding properties to configure the
extension and the TR-196 data model to be used for any device.
The support for discovering multiple objects instances associated with a parameter, is also available for
TR-196 devices.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
1-4
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
2
Broadband Access Center Architecture
This chapter describes the system architecture implemented in this Cisco Broadband Access Center
(Cisco BAC) release.
This chapter includes the following sections:
•
•
Cisco BAC Deployment
Cisco BAC provisions devices are based on the TR-069, TR-098, TR-104, TR-106, TR-181, and TR-196
standards. This includes Ethernet and ADSL gateway devices, wireless gateways, VoIP ATAs, and other
devices compliant with the CPE WAN Management Protocol (CWMP).
Figure 2-1 represents a typical, fully redundant, CWMP deployment in a Cisco BAC network.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
2-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 2 Broadband Access Center Architecture
Architecture
Figure 2-1
CWMP Deployment in Cisco BAC
Provisioning Group 1
Load
CNR DHCP
Balancer
Servers
STUN
Server
BAC DPE CAR RADIUS
Servers
Servers
Redundant
BAC RDU
Server
Access
IP
Network
Target
Subscriber
Central Location
Provisioning Group [n]
Operations
Support
Systems
Load
CNR DHCP
Servers
Balancer
CHMS
Server
BAC DPE CAR RADIUS
Servers
Servers
Architecture
This section describes the basic Cisco BAC architecture including:
•
Regional Distribution Unit (RDU) that provides:
–
–
–
The authoritative data store of the Cisco BAC system.
Support for processing application programming interface (API) requests.
Monitoring of the system’s overall status and health.
Device Provisioning Engines (DPEs) that provide:
•
–
–
–
–
–
–
Interface with customer premises equipment (CPE).
Configuration and firmware policy instructions cache.
Autonomous operation from the RDU and other DPEs.
CPE WAN Management Protocol (CWMP) service.
IOS-like command line interface (CLI) for configuration.
Hypertext Transfer Protocol (HTTP) file service.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
2-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 2 Broadband Access Center Architecture
Architecture
•
•
STUN server:
–
Supports a UDP based connection request mechanism defined in TR069 Annex G to allow Cisco
BAC to initiate a session with a CPE that is operating behind a NAT Gateway.
Cisco Management Heartbeat Server (CMHS) server:
–
A new connection request method that allows Cisco BAC to send connection requests to DLC
devices through the CMHS server, using BAC north bound API interfaces or BAC Admin UI.
•
•
Client API that provides total client control over the system’s capabilities.
Provisioning Groups that provide:
–
Logical grouping of DPE servers, CAR-RADIUS servers and CNR-DHCP servers in a
redundant cluster.
–
Redundancy and scalability
The Cisco BAC process watchdog that provides:
•
–
–
–
–
Administrative monitoring of all critical Cisco BAC processes.
Automated process restart capability.
Ability to start and stop Cisco BAC component processes.
Ability to send the SNMP trap if any BAC process fails to start or stop, or stops unexpectedly.
SNMP trap is a mechanism that the trap receiver uses to get the information about the process
or component failure. A SNMP trap is also sent if Cisco BAC process watchdog fails to start on
any of the servers that run Cisco BAC components. Cisco BAC process watchdog reports all the
critical conditions of BAC components through SNMP trap.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
2-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 2 Broadband Access Center Architecture
Architecture
•
An administrator user interface that provides:
–
Support for adding, deleting, and modifying CWMP devices; searching for devices, retrieving
device details, and running device operations.
–
–
–
Support for configuring global defaults and defining custom properties.
Ability to view additional performance statistics.
Management of firmware rules and configuration templates.
An SNMP agent that supports:
•
•
–
–
–
Third-party management systems.
SNMP version v2.
SNMP Notification.
Cisco Network Registrar servers that provide:
–
Dynamic Host Configuration Protocol (DHCP).
Regional Distribution Unit
The Regional Distribution Unit (RDU) is the primary server in the Cisco BAC provisioning system. It is
installed on a server running the Solaris 10 or Linux 5.x operating system.
The functions of the RDU include:
•
•
•
•
•
Managing preprovisioned and discovered data from devices.
Generating instructions for DPEs and distributing them to DPE servers for caching.
Cooperating with DPEs to keep them up to date.
Processing API requests for all Cisco BAC functions.
Managing the Cisco BAC system.
The RDU supports the addition of new technologies and services through an extensible architecture.
Cisco BAC currently supports one RDU per installation. Use of clustering software from Veritas or Sun
is recommended for providing RDU failover. Use of RAID (Redundant Array of Independent Disks)
shared storage is recommended in such a setup.
Device Provisioning Engines
The Device Provisioning Engine (DPE) communicates with the CPE on behalf of the RDU to perform
provisioning or management functions.
The RDU generates instructions that the DPE must perform on the device. These instructions are
distributed to the relevant DPE servers, where they are cached. These instructions are then used during
interactions with the CPE to perform tasks, such as configuration of devices, firmware upgrades, and
data retrieval.
Each DPE caches information for up to 500,000 devices, and multiple DPEs can be used to ensure
redundancy and scalability.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
2-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 2 Broadband Access Center Architecture
Architecture
The DPE manages these activities:
•
•
•
•
Synchronization with RDU to retrieve the latest set of instructions for caching.
Communication with CPE using HTTP and HTTPS for file download service.
Authentication and encryption of communication with CPE.
Authenticate and Authorize CPE by processing the request from RADIUS server.
The DPE is installed on a server that is running the Solaris 10 or Linux 5.x operating system. The DPE
is configured and managed by using the CLI, which you can access locally or remotely using Telnet. See
commands that a DPE supports.
See these sections for other important information:
•
•
Also, familiarize yourself with the concept of instruction generation, which is described in Instruction
DPE Extension
The DPE extension interface provides several levels of extensibility that range from ability to make
minor changes to existing behavior via an extension to a complete overhaul of DPE behavior that allows
it to perform any logic with HTTP or CWMP. It can even function independent of the RDU. The DPE
extension simply augments the existing CWMP behavior.
However, when DPE is extended in such a way that RDU is either not required or is not used to store all
device records, alternative licensing is needed. The Feature Pack licensing feature, described in DPE
Licensing, page 2-5, provides the alternative licenses.
DPE Licensing
Licensing controls the number of DPEs (nodes) that you can use. If you attempt to install more DPEs
than you are licensed to have, those new DPEs will not be able to register with the RDU, and will be
rejected. Existing licensed DPEs remain online.
Note
For licensing purposes, a registered DPE is considered to be one node.
Whenever you change licenses, by adding a license, extending an evaluation license, or through the
expiration of an evaluation license, the changes take immediate effect.
When you delete a registered DPE from the RDU database, a license is freed. Since the DPEs
automatically register with the RDU, you must take the DPE offline if the intention is to free-up the
license. Then, delete the DPE from the RDU database by using the RDU administrator user interface.
Note
The functions enabled using a specific license, continue to operate even when the corresponding license
is deleted from the system.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
2-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 2 Broadband Access Center Architecture
Architecture
Cisco BAC now provides a mechanism to license DPE extension feature packs. The feature pack licenses
indicate the count of the devices that can be processed by the feature pack extension. The feature pack
licenses can be added to the RDU through Cisco BAC admin UI or API independently with or without
CWMP / DPE licenses.
DPEs that are rejected during registration because of licensing constraints, do not appear in the
administrator user interface. To determine the license state, you need to examine the log files of the RDU
and the DPE.
Provisioning Groups
A provisioning group is designed to be a logical (typically geographic) grouping of servers that usually
consist of one or more DPEs, CNR-DHCP servers and CAR-RADIUS servers. Each DPE in a given
provisioning group, caches identical sets of instructions from the RDU; thus enabling redundancy and
load balancing.
A single provisioning group can handle the provisioning needs of up to 500,000 devices. As the number
of devices grows past 500,000, you can add additional provisioning groups to the deployment.
Note
The servers for a provisioning group are not required to reside at a regional location, they can just as
easily be deployed in the central network operations center.
For more information, see:
•
•
Discovery of ACS URL
In the distributed architecture that Cisco BAC provides, the RDU is the centralized aggregation point
that never directly interacts with a CPE. Any required interactions with the CPE are delegated to the
provisioning group.
Each device identifies the provisioning group to which it connects by the URL of a single
autoconfiguration server (ACS); in other words, the DPE. Until the URL is updated, the device contacts
the DPE at the same URL.
All redundant DPEs in a given provisioning group, must share a single ACS URL. The RDU has to be
aware of the URL that is associated with each provisioning group and, by extension, of all DPEs in that
provisioning group. The RDU uses its knowledge of the provisioning group’s ACS URL to redirect
devices to a new provisioning group, when required.
The RDU automatically learns the provisioning group’s ACS URL from DPE registrations; or the ACS
URL is configured on the provisioning group object, using the API or the administrator user interface.
For information on configuring the ACS URL, see Provisioning Group Configuration Workflow,
The CPE can determine the ACS (DPE) URL in one of two ways:
•
By preconfiguring the URL on the device. This ACS URL is the configured URL of the Cisco BAC
server that is associated with each provisioning group. The URL is preconfigured on the device
before it is shipped to the customer, and is also known as the assigned URL.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
2-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 2 Broadband Access Center Architecture
Architecture
•
By discovering the URL via DHCP. This ACS URL is returned in response to a DHCP Discover, a
DHCP Request, or a DHCP Inform. This mechanism is limited to deployments of primary Internet
gateway devices, because it requires the ability to make DHCP requests to the WAN side.
Note
Assigning a URL using preconfiguration is a more secure mechanism than one discovered
using DHCP.
Provisioning Group Scalability
Provisioning groups enhance the scalability of the Cisco BAC network by making each provisioning
group responsible for only a subset of devices. This partitioning of devices can be along regional
groupings or any other policy that the service provider defines. When the size of the provisioning group
is restricted, the DPEs can be more effective in caching the necessary information.
To scale a deployment, the service provider can:
•
•
•
Upgrade existing DPE server hardware.
Add DPE servers to a provisioning group.
Add provisioning groups.
Cisco BAC Process Watchdog
The Cisco BAC process watchdog is an administrative agent that monitors the runtime health of all Cisco
BAC processes. This watchdog process ensures that if a process stops unexpectedly, it is automatically
restarted.
The Cisco BAC process watchdog can be used as a command line tool to start, stop, restart, and
determine the status of any monitored processes.
processes.
SNMP Agent
Logging
Cisco BAC provides basic SNMP v2-based monitoring of the RDU and the DPE servers. The Cisco BAC
SNMP agents support SNMP informs and traps. You can configure the SNMP agent on the DPE by using
snmp-server CLI commands, and on the RDU by using the SNMP configuration command-line tool.
additional information on the DPE CLI.
Logging of events is performed at the DPE and the RDU. In some unique situations, DPE events are
additionally logged at the RDU to give them higher visibility. Log files are located in their own log
directories and can be examined by using any text processor.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
2-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 2 Broadband Access Center Architecture
Architecture
You can compress the files for easier e-mailing to the Cisco Technical Assistance Center or system
integrators for troubleshooting and fault resolution. You can also access the RDU and the DPE logs from
the administrator user interface.
For detailed information on log levels and structures, and how log files are numbered and rotated, see
Access Registrar
CAR is a RADIUS (Remote Authentication Dial-In User Service) server that enables multiple dial-in
Network Access Server (NAS) devices to share a common authentication, authorization, and accounting
database.
For additional information on Access Registrar, see the User Guide for Cisco Access Registrar 5.0 and
RADIUS
CAR is based on a client/server model, which supports AAA (authentication, authorization, and
accounting). The client is the Network Access Server (NAS) and the server is CAR. The client passes
user information onto the RADIUS server and acts on the response it receives.
The server, on the other hand, is responsible for receiving user access requests, authenticating and
authorizing users, and returning all necessary configuration information that the client can then pass on
to the user.
Cisco BAC now supports RADIUS for device authentication. CAR provides an extension mechanism to
allow customization of RADIUS requests and responses. Cisco BAC handles the Authentication and
Authorization request through this extension.
Cisco Network Registrar
Cisco Network Registrar provides the DHCP functionality in Cisco BAC. The DHCP extension points
on Network Registrar integrate Cisco BAC with Network Registrar. Using these extensions, the CNR
registers itself with Cisco BAC.
Note
Cisco Network Registrar (CNR) is re-branded to Cisco Prime Network Registrar starting with the 8.0
release.
For additional information on Cisco Prime Network Registrar, see the Cisco Prime Network Registrar
DHCP
The DHCP server automates the process of configuring IP addresses on IP networks. The protocol
performs many of the functions that a system administrator carries out when connecting a device to a
network. DHCP automatically manages network-policy decisions and eliminates the need for manual
configuration. This feature adds flexibility, mobility, and control to networked device configurations.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
2-8
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 2 Broadband Access Center Architecture
Architecture
LeaseQuery
The LeaseQuery feature allows you to request lease information from the Network Registrar DHCP
servers. In this release, the LeaseQuery feature is being used by Connection Request and Femto
Authorization Service.
The Connection Request performs the LeaseQuery by providing the list of DHCP servers, whereas the
Femto Authorization Service performs the LeaseQuery, using the provisioning group. In case of Femto
Authorization Service, the DPE sends DHCP LeaseQuery messages only to the DHCP servers registered
for the device's provisioning group, which prevents querying all DHCP servers in the network.
Among all responses, the response from the server that last communicated with the devices, is taken as
the authoritative answer.
In earlier Cisco BAC versions, the LeaseQuery feature relied on the operating system to select the source
interface and the source port for sending LeaseQuery requests. In this release, you can configure the
RDU to use a specific interface and source port.
For detailed information on configuring LeaseQuery in this Cisco BAC release, see Configuring Lease
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
2-9
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 2 Broadband Access Center Architecture
Architecture
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
2-10
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
3
Configuration Workflows and Checklists
This chapter is divided into two major sections that define the processes to follow when configuring
Cisco Broadband Access Center (Cisco BAC) components to support various technologies.
This chapter includes the following sections:
•
•
Component Workflows
This section describes the workflows you must follow to configure each Cisco BAC component for the
technologies supported by Cisco BAC. These configuration tasks are performed before configuring
Cisco BAC to support specific technologies.
The component workflows described in this section are arranged in a checklist format and include:
•
•
RDU Checklist
Table 3-1 identifies the workflow to follow when configuring the RDU.
Table 3-1 RDU Workflow Checklist
Procedure
Refer to...
1. Configure the system syslog service for use with
Cisco BAC.
3. Change the admin password.
4. Add the appropriate license keys.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
3-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 3 Configuration Workflows and Checklists
Component Workflows
Table 3-1
RDU Workflow Checklist (continued)
Procedure
Refer to...
5. Configure the RDU database backup procedure.
6. Configure the RDU SNMP agent.
DPE Checklist
Note
Items marked with an asterisk (*) are mandatory tasks or procedures.
Table 3-2
DPE Configuration Checklist
Procedure
Refer to ...
with Cisco BAC.
2. Change the passwords.*
3. Configure the provisioning interface.
The interface ethernet [intf0 | intf1] command
described in the Cisco Broadband Access Center
4. Configure the Cisco BAC shared secret.*
The dpe shared-secret command described in the
5. Configure the DPE to connect to the desired The dpe rdu-server command described in the
RDU.*
6. Configure the network time protocol (NTP). Solaris or Linux documentation for configuration
information.
7. Configure the provisioning group name.*
The dpe provisioning-group primary command
described in the Cisco Broadband Access Center
8. Configure the required routes to the RDU as Solaris or Linux documentation for configuration
well as to the devices in the network.
information.
9. Configure the DPE SNMP agent.
The SNMP agent commands in the Cisco
Note
You can configure the SNMP agent using either the DPE command line interface or the
snmpAgentCfgUtil.sh tool. For more information, see Using the snmpAgentCfgUtil.sh Tool,
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
3-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 3 Configuration Workflows and Checklists
Technology Workflows
Table 3-2
DPE Configuration Checklist (continued)
Refer to ...
Procedure
the RDU and was registered.
11. Configure the home provisioning group
The interface ip x.x.x.x. pg-communication and
service cwmp-redirect 1 enable commands
described in the Cisco Broadband Access Center
redirection service on the DPE
Technology Workflows
This section describes the tasks that you must perform when configuring Cisco BAC to support specific
technologies; in this case, CWMP. These configuration tasks are performed after configuring Cisco BAC
components.
The CWMP technology workflows described in this section are arranged in a checklist format and
include:
•
•
RDU Configuration Workflow
Table 3-3 identifies the configuration tasks you must perform to configure the RDU for the CWMP
technology.
Table 3-3
RDU Configuration Workflow
Procedure
Refer to ...
1. Create service profiles by using the Cisco BAC
Class of Service.
Define custom properties referenced in templates
from the administrator user interface. The custom
properties can be referenced in configuration and
firmware rules templates.
For each service, you must:
a. Create a configuration template.
Add the configuration template to the RDU
from the administrator user interface.
b. Create a firmware rules template.
–
Add the firmware images to the RDU from the
administrator user interface.
–
Add the firmware rules template to the RDU
from the administrator user interface.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
3-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 3 Configuration Workflows and Checklists
Technology Workflows
Table 3-3
RDU Configuration Workflow (continued)
Procedure
Refer to ...
c. Create a Class of Service from the
administrator user interface.
Remember to:
–
–
–
Specify the configuration template file.
Specify the firmware rules file.
Optionally, specify properties.
2. Configure default settings for the CWMP
technology from the administrator user interface.
–
Set the default Class of Service; for example,
for unknown devices.
–
Set the Connection Request Service defaults
from any of the following pages:
Configuration > Class of Service;
Configuration > Defaults; and Devices.
3. Preregister the CWMP devices.
Preregistering Device Data in Cisco BAC
Preregistering adds the device record to the RDU before the device makes initial contact with the DPE.
The DPE is also known as the autoconfiguration server (ACS). This task is typically executed from the
provisioning API. However, you can preregister device data from the administrator user interface as
well.
To preregister device data in Cisco BAC:
Step 1
Add the device record to the RDU database by using the API or the administrator user interface.
To add a device record from the administrator user interface:
a. Choose Devices > Manage Devices.
b. On the Manage Devices page, click Add.
The Add Device page appears.
c. Enter values in the appropriate fields. The required and recommended provisioning attributes for a
preregistered device are:
Required
•
•
•
Device identifier
Registered Class of Service
Home provisioning group
Additional Typical Attributes
Additional attributes may be required depending on customer premises equipment (CPE)
authentication methods.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
3-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 3 Configuration Workflows and Checklists
Technology Workflows
•
•
•
•
Owner identifier
CPE password, if client authentication using unique client certificates is not enabled.
Connection Request username. This step is optional.
Connection Request password. This step is optional.
Optional
Connection Request Methods on the Class of Service. This step is optional.
Configuring the connection request method enables device authentication of the
autoconfiguration server. Choose from:
•
•
•
Discovered
Use FQDN
Use IP
Step 2
Verify whether the device record is preregistered. To do this:
•
Examine the Device Details. To do this:
From the Devices > Manage Devices page, click the View Details icon ( ) corresponding to the
device. From the Device Details page:
–
–
Check if the device settings are correct.
Look for discovered parameters; these parameters are not displayed if the device is yet to initiate
its first contact with the DPE.
–
Check the Device History log.
•
Step 3
Step 4
Configure the device to send periodic informs to the DPE. To do this, set the PeriodicInformEnable and
the PeriodicInformInterval variables in a configuration template.
Initiate device contact with Cisco BAC for the first time. To initiate device contact, do one of the
following:
•
•
•
Initiate a connection request from the API.
Wait for the next periodic contact from the device.
Reboot.
Step 5
Verify the first device contact with Cisco BAC. From Device > Manage Devices > Device Details, check
if discovered properties are visible. Also, check the history log for details.
DPE Configuration Workflow
This section describes how you can provide CWMP support at the DPE, by configuring:
•
•
•
CWMP services for CWMP management on the DPE.
HTTP file services for firmware management on the DPE.
Configuring HTTP auth service on DPE.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
3-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 3 Configuration Workflows and Checklists
Technology Workflows
Configuring CWMP Service on the DPE
Table 3-4 identifies the configuration tasks that you must perform to configure the CWMP services on
the DPE.
Table 3-4
DPE Configuration Workflow - CWMP Management
Procedure
Refer to ...
Configure the CWMP services that run on the DPE. The CWMP Technology Commands described
Configuring the CWMP technology on the DPE
requires that you enable at least one CWMP service.
To enable a CWMP service, enter:
service cwmp num enable true
where num identifies the CWMP service, which
could be 1 or 2.
By default, the CWMP service is:
–
–
Enabled on service 1.
Disabled on service 2.
1. Configure the port on which the CWMP service The service cwmp num port port command
communicates with the CPE.
described in the Cisco Broadband Access Center
By default, the CWMP service is configured to
listen on:
–
–
Port 7547 for service 1.
Port 7548 for service 2.
2. Configure client authentication for the CWMP The service cwmp num client-auth mode
service.
command described in the Cisco Broadband
To limit security risks during client
authentication, we recommend using the Digest
mode (the default configuration).
You should not allow client authentication in the
Basic mode, or altogether disable Basic and
Digest authentication.
3. Configure client authentication using
The service cwmp num ssl client-auth mode
4. Configure the DPE to request configuration
The service cwmp num allow-unknown-cpe
Enabling this feature may allow a Denial of
Service attack on the RDU.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
3-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 3 Configuration Workflows and Checklists
Technology Workflows
Configuring HTTP File Service on the DPE
Table 3-5 identifies the configuration tasks that you must perform to configure the HTTP file services
running on the DPE.
Table 3-5
DPE Configuration Workflow - Firmware Management
Procedure
Refer to ...
Configure the HTTP file service that runs on the
DPE.
The CWMP Technology Commands described
Configuring firmware management on the DPE
requires that you enable at least one HTTP file
service. To enable a HTTP file service, enter:
service http num enable true
where num identifies the HTTP file service,
which could be 1 or 2.
By default, the HTTP service is:
–
–
Enabled on service 1.
Disabled on service 2.
1. Configure the port on which the HTTP file
The service http num port port command
described in the Cisco Broadband Access Center
service communicates with the CPE.
By default, the HTTP file service is configured
to listen on:
–
–
Port 7549 for service 1.
Port 7550 for service 2.
2. Configure client authentication for the HTTP
The service http num client-auth mode
command described in the Cisco Broadband
file service.
To limit security risks during client
authentication, we recommend that you use the
Digest mode (the default configuration).
You should not allow client authentication in the
Basic mode, or altogether disable Basic and
Digest authentication.
3. Configure client authentication by using
certificates through SSL for the HTTP file
service.
The service http num ssl client-auth mode
described in the Cisco Broadband Access Center
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
3-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 3 Configuration Workflows and Checklists
Technology Workflows
Configuring HTTP Auth Service on the DPE
Table 3-6 below identifies the configuration tasks that you must perform to configure the AUTH services
on the DPE.
Table 3-6
DPE Configuration Workflow - AUTH Management
Procedure
Refer to ...
Configure the Auth service that run on the DPE.
To enable a Auth service, enter:
The CWMP Technology Commands described
service auth 1 enabled true
By default, the Auth service is enabled.
Configure the http interface on which the Auth
service is running on.
The service http num port port command
described in the Cisco Broadband Access Center
To configure the Auth service interface, enter:
service auth 1 address (host_fqdn)
By default, the Auth service is configured to listen
on localhost.
Configure the port on which the Auth service
communicates with the CAR-EP.
The service http num client-auth mode
command described in the Cisco Broadband
To configure the Auth service port, enter:
service auth 1 port port_num
By default, the Auth service is configured to listen
on 7551.
Enables or disables use of HTTP over SSL/TLS for The service http num ssl client-auth mode
the Auth service.
described in the Cisco Broadband Access Center
To enable SSL/TLS for the Auth Service interface,
enter:
service auth 1 ssl enabled true
Provisioning Group Configuration Workflow
Provisioning groups are automatically created when the DPE is first configured to be in a particular
provisioning group (see Adding DPE to a Provisioning Group, page 12-18), and then it registers with the
RDU. After the provisioning group is created, you can configure it by assigning the URL of the Cisco
BAC server from the administrator user interface.
Before configuring the provisioning group URL, familiarize yourself with Cisco BAC concepts
regarding local and regional redundancy. These concepts are described in Provisioning Group Scalability
Note
We recommend that you assign a URL to the provisioning group right when you create the provisioning
group. Assigning the URL enables CPE redirection between provisioning groups. If you are using a load
balancer, ensure that the address of the load balancer is used as the ACS URL.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
3-8
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 3 Configuration Workflows and Checklists
Technology Workflows
To configure the ACS URL of a provisioning group from the administrator user interface:
Step 1
Step 2
Step 3
On the primary navigation bar, click Servers > Provisioning Groups.
The Manage Provisioning Groups page appears.
Click the identifier link of the correct provisioning group.
The View Provisioning Group Details page appears.
In the Provisioning Group Properties area, enter the URL in the ACS URL field.
Note
Remember that the URL that you configure overrides the discovered ACS URL.
Step 4
Click Submit.
The provisioning group now contacts Cisco BAC at the URL that you configured.
Configuring Home Provisioning Group Redirection Service on the DPE
Cisco BAC provides redirection to the home provisioning group of a device by having the provisioning
To enable the home provisioning group redirection feature, you must configure the home provisioning
group redirection service on the DPE.
Table 3-7 identifies the configuration tasks that you must perform to configure the home provisioning
group redirection service on the DPE.
Table 3-7
Home Provisioning Group Redirection Configuration
Procedure
Refer to...
1. Configure the DPE to use the interface
The interface ip x.x.x.x. pg-communication
with other provisioning groups.
If you do not configure the DPE to use this
interface, the DPE always binds to the localhost.
2. Configure the cwmp-redirect service on the
The service cwmp-redirect 1 enable command
described in the Cisco Broadband Access Center
DPE.
To enable the cwmp-redirect service, enter:
service cwmp-redirect 1 enable true
For information on CLI commands used for the cwmp-redirect service, see the Cisco Broadband
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
3-9
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 3 Configuration Workflows and Checklists
Technology Workflows
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
3-10
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
4
CPE Management Overview
This chapter describes the management of customer premises equipment (CPE) by using the CPE WAN
Management Protocol for Cisco Broadband Access Center (BAC).
This chapter includes the following sections:
•
•
•
•
•
•
•
•
•
•
CWMP Overview
Cisco BAC communicates with CPE through the CPE WAN Management Protocol (CWMP) according
to parameters described in the TR196, TR-069, and other related data model specifications. CWMP
encompasses secure management of CPE, including:
•
•
•
•
Autoconfiguration and dynamic service provisioning
Firmware management
Device diagnostics
Performance and status monitoring
Cisco BAC supports devices based on the TR-069, TR-098, TR-104, TR-106, TR-181, and TR-196
standards. This support includes Ethernet and ADSL gateway devices, wireless gateways, VoIP ATAs,
and other devices compliant with CWMP. This release also provides for runtime-extensible data models
to support any upcoming data-model standards or any vendor-specific data models.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Cisco BAC Device Object Model
Cisco BAC Device Object Model
The Cisco BAC device object model is crucial in controlling the configuration and firmware rules that
are generated as instructions for the DPE to manage devices. This process occurs at the RDU, and is
controlled through named attributes and relationships.
The main objects in the device object model are:
•
•
•
•
•
•
IPDevice—Represents a network entity that requires provisioning.
Owner ID—Represents an external identifier for a subscriber.
Device Type—Represents the type of the device.
ProvGroup—Represents a logical grouping of devices serviced by a specific set of DPEs.
Class of Service—Represents the configuration profile to be assigned to a device.
File—Serves as a container for files used in provisioning that include templates and firmware
images.
•
Group—Is a customer-specific mechanism for grouping devices.
Common among the various objects in the Cisco BAC device data model are:
•
•
•
•
Name. For example, Gold Class of Service
Attributes. For example, Device ID and a fully qualified domain name (FQDN)
Relationships. For example, the relationship of a device to a Class of Service
Properties. For example, a property which specifies that a device must be in a provisioning group.
See Figure 4-1 for a description of the interaction between the various objects in the device data model.
Figure 4-1
Device Object Model
0..*
0..*
0..*
0..2
Prov Group
Class of Service
1..1
File
0..*
1..1
0..*
0..*
0..*
IPDevice
1..*
0..*
0..n
Group
0..n
0..*
1..1
0..1
1..1
Device Type
Owner ID
Group Type
In the Cisco BAC device object model, the IPDevice is related to the Class of Service, the Provisioning
Group, and the Device Type. The Class of Service is then related to the Configuration Template and the
Firmware Rules Template. Files can be related to one another, such as the firmware rules template being
related to the firmware image.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Cisco BAC Device Object Model
Table 4-1 describes the attributes and relationships unique to each object in the data model.
Table 4-1
Device Object Relationships
Object
Related to ...
IP Device
•
Could be preregistered or unregistered (See Device
•
•
•
•
Owner ID
Provisioning Group
Class of Service
Device Type
•
Attributes include Device ID (OUI-Serial) and FQDN
Owner ID
•
Is associated with devices and, therefore, cannot exist
IP Device
without a device related to it.
•
Enables grouping; for example, you can group all devices
belonging to Joe.
Device Type
•
Stores defaults common to all devices of a technology,
IP Device
specifically CWMP.
•
Enables grouping; for example, you can group all CWMP
devices.
File
•
Stores files used in provisioning; for example,
Class of Service
configuration template and firmware rules template
Class of Service
Attributes include Type, Name, and Properties. (For
•
•
•
•
IP Device
File
Configuration Template
(optional)
•
Firmware Rules Template
(optional)
Class of Service
Class of Service is an RDU abstraction that represents the configuration to be handed to the device in
the form of templates. It enables you to group devices into configuration sets, which are service levels
or different packages that are to be provided to the CPE.
The different Classes of Service are:
•
•
•
Registered—Specified by the user when the device is registered. This Class of Service is explicitly
added to the device record using the application programming interface (API).
Selected—Selected by the RDU for a device that, for one reason or another, cannot retain its
registered Class of Service.
Related—Related to the device by being registered, selected, or both.
If the selected Class of Service for a device is changed, the Instruction Generation Service regenerates
instructions for the device configuration.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Discovering CPE Parameters
If the registered Class of Service for a device is changed, it regenerates instructions for the generated
device configuration even if it is not the selected Class of Service, since it could impose a policy that
would change the selected Class of Service.
Other concepts related to the device data model are:
•
•
Property Hierarchy
While processing configuration templates for substitutable parameters, Cisco BAC searches objects for
this property using a certain order called Property Hierarchy.
Cisco BAC properties allow you to access and store data in Cisco BAC using the API. Preprovisioned,
discovered, and status data can be retrieved through the properties of corresponding objects, using the
API. Properties also enable you to configure Cisco BAC at the appropriate level of granularity (from
system level to device groups and to individual devices).
The Cisco BAC property hierarchy gives you the flexibility to define system-wide or service class
defaults that can be overridden by individual devices.
Cisco BAC allows you to store any number of properties on objects in its data model. You can reference
these properties in configuration templates or firmware rules. You can use properties in this property
hierarchy:
1. Device
3. Provisioning Group
4. Class of Service
5. Device Type
6. System Defaults
Custom Properties
Custom properties allow for the definition of new properties, which can then be stored on any object via
the API.
Custom properties are variable names defined in the RDU, and must not contain any spaces. The
template parser works from bottom up when locating properties in the hierarchy and converts the
Discovering CPE Parameters
Cisco BAC is enabled to read CPE parameters using Remote Procedure Calls (RPCs) as defined in
CWMP. This is made possible through the Data Synchronization Instruction. This instruction discovers
data from the CPE device, reports it to the RDU, and keeps the RDU up-to-date when CPE device data
changes.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Multi-Instance Object Support
This instruction can be used to keep the RDU up-to-date on such key parameters as the software version
and the model name. These parameters may, in turn, be used to generate other instructions, such as
configuration instructions specific to a given device type.
Table 4-2 lists the default parameters that Cisco BAC discovers.
Table 4-2
Default Discovered Parameters
Parameter
Description
Inform.DeviceId.Manufacturer
Inform.DeviceId.ManufacturerOUI
Inform.DeviceId.ProductClass
Identifies the manufacturer of the CPE.
Identifies the unique identifier of the CPE manufacturer.
Identifies the product or class of product over which the
manufacturer’s SerialNumber parameter is unique.
InternetGatewayDevice.DeviceInfo.
HardwareVersion
Identifies the hardware version of the CPE.
InternetGatewayDevice.DeviceInfo.
SoftwareVersion
Identifies the software version currently installed on the
CPE.
InternetGatewayDevice.DeviceInfo.
ModelName
Identifies the model name of the CPE.
InternetGatewayDevice.
ManagementServer.ParameterKey
Specifies the value of the ParameterKey from the most
recent SetParameterValues, AddObject, or DeleteObject
call from the server.
These parameters can be updated using the API (using the /server/acs/discover/parameters property) or
Note
Even if the device has a different root object, such as Device, instead of InternetGatewayDevice, the
parameters are still discovered.
Multi-Instance Object Support
In this release, the multi-instance object support introduces the ability to discover the multi-instance
object parameters from the device without specifying the actual instance number. Multi-instance object
support is available as an usability improvement in the following BAC modules to aid deployment:
•
•
•
•
This feature will be functional only when the RDU and all the DPEs are upgraded to Cisco BAC 3.8. To
configure the configuration template and the firmware template with multi-instance objects the value of
the newly introduced templateVersion attribute value should be 3.0.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Multi-Instance Object Support
Configuration Template
Earlier to this release of BAC, the scope of configuration template represented only the possible set
parameter values and set parameter attributes that could be performed. There was no mechanism to
discover object names.
In this release, the template scope is extended to include the following:
•
•
•
•
The ability to discover object names
The ability to discover parameter values
The ability to delete object instances
The ability to add object instances
A new attribute sync-method is introduced in the configuration template. The sync-method instructs the
configuration sync process to interact with the device to discover the object instances. For the discovered
object instances the ACS has total control to configure the parameters available in the object’s sub-tree.
The following are the available sync-methods.
Sync-method
Description
discovered
If this condition is specified, BAC discovers the object instances based on the
instance attribute value specified for the object instance.
replace-all
If this condition is specified, BAC first discovers the parameter value for the
specified parameter name from all the object instances. For the discovered object
instances the following operations are possible:
•
•
•
If a matching object instance is found with the specified parameter value, it
updates the object instance with the new parameter value.
If no matching instance is found, BAC creates an object instance with the new
parameter value.
If an object instance is found with the different parameter value, that object
instance is deleted.
replace-augment This operates same as replace-all, except that BAC retains the instances that does
not match the parameters configured.
delete-all
If this condition is specified, BAC simply deletes all the available instances at that
level.
delete
If this condition is specified, BAC deletes the instance that match the value specified
in the instance attribute.
Any one of the following instance attribute must be mandatorily used with discovered and delete
sync-method:
•
•
•
all() - This option indicates BAC to discover all the instances
last() - This option indicates BAC to discover the last instance
compare(parameterName operation matchValue) - This option indicates BAC to discover the object
instances in which the parameter and the value are in accordance with the operation.
Note
Valid compare operators are: equals, equalsIgnoreCase, notEquals, lessThan, lessThanEquals,
greaterThanEquals, greaterThan.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Multi-Instance Object Support
•
Index - This option can be used for direct indexing and accepts a valid positive integer. This is the
index into the returned instance names. For example, index value 1 returns the first instance.
In configuration template, the expression parameters in pre-requisites can also be configured with
multi-instance object parameters, with any of the discovered options. For more information on
Example 4-1 Multi-Instance Object Using replace-all in Configuration Template
The following example illustrates usage of multi-instance object using replace-all in configuration
template:
<Configuration templateVersion="3.0">
<ParameterDictionaries>
<ParameterDictionary>tr196-cwmp-dictionary-v2.0.xml</ParameterDictionary>
</ParameterDictionaries>
<ObjectInstance name="Device">
<ObjectInstance name="Services">
<ObjectInstance name="FAPService">
<ObjectInstance name="{i}" sync-method="discovered" instance="all()">
<ObjectInstance name="CellConfig">
<ObjectInstance name="UMTS">
<ObjectInstance name="RAN">
<ObjectInstance name="NeighborList">
<ObjectInstance name="IntraFreqCell"
sync-method="replace-all" primary-keys="PLMNID,LAC,RNCID">
<ObjectInstance name="{i}">
<Parameter>
<Name>RAC</Name>
<Value>10</Value>
</Parameter>
<Parameter>
<Name>PLMNID</Name>
<Value>VAR(name=FC-PLMN-ID,
defaultValue=123452)</Value>
</Parameter>
<Parameter>
<Name>LAC</Name>
<Value>65532</Value>
</Parameter>
<Parameter>
<Name>RNCID</Name>
<Value>18</Value>
</Parameter>
</ObjectInstance>
<ObjectInstance name="">
<Parameter>
<Name>RAC</Name>
<Value>11</Value>
</Parameter>
<Parameter>
<Name>PLMNID</Name>
<Value>123452</Value>
</Parameter>
<Parameter>
<Name>LAC</Name>
<Value>65533</Value>
</Parameter>
<Parameter>
<Name>RNCID</Name>
<Value>21</Value>
</Parameter>
</ObjectInstance>
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Multi-Instance Object Support
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
</Configuration>
The behavior of BAC to apply the above template configuration during configuration sync is explained
below:
1. BAC retrieves GetParameterNames RPC data for the object Device.Services.FAPService. with next
level option set to true.
2. Since all() option is configured, it uses all of the returned instances for further processing.
3. BAC searches the PLMNID, LAC and RNCID by issuing GetParameterValues RPC for the
parameter
Device.Services.FAPService.{all()}.CellConfig.UMTS.RAN.NeighborList.IntraFreqCell.{i}.PLM
NID,
Device.Services.FAPService.{all()}.CellConfig.UMTS.RAN.NeighborList.IntraFreqCell.{i}.LAC
and
Device.Services.FAPService.{all()}.CellConfig.UMTS.RAN.NeighborList.IntraFreqCell.{i}.RNC
ID for all the instances.
4. For all the matching instances that have a value of PLMNID equals 123452, LAC equals 65532 and
RNCID equals 18, SetParameterValues is performed with the configured RAC value 10.
5. For all the matching instances that have a value of PLMNID equals 123452, LAC equals 65533 and
RNCID equals 21, SetParameterValues is performed with the configured RAC value 11.
6. If a matching instance is not found for the configured PLMNID, LAC, RNCID values, a new
instance is created using AddObject RPC and the configured values of PLMNID, LAC, RNCID and
RAC are applied on the new instance.
7. If there are instances available on the device that does not match the PLMNID, LAC and RNCID,
they are deleted using DeleteObject Message.
Example 4-2 Multi-Instance Object Using delete-all in Configuration Template
The following example illustrates usage of multi-instance object using delete-all in configuration
template:
<Configuration templateVersion="3.0">
<ParameterDictionaries>
<ParameterDictionary>tr196-cwmp-dictionary.xml</ParameterDictionary>
</ParameterDictionaries>
<ObjectInstance name="Device">
<ObjectInstance name="Services">
<ObjectInstance name="FAPService">
<ObjectInstance sync-method="discovered" instance="last()">
<ObjectInstance name="REM.UMTS.GSM.Cell" sync-method="delete-all" >
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
</Configuration>
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-8
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Multi-Instance Object Support
The behavior of BAC to push the above template configuration during configuration sync is explained
below:
1. BAC discovers the instances in the object Device.Services.FAPService. by issuing
GetParameterNames RPC with next level set to true.
2. Since last() method is used, it gets the last instance and discovers the instances in the next level by
issuing GetParameterNames RPC for the parameter
Device.Services.FAPService.{last()}.REM.UMTS.GSM.Cell.{i}. with next level set to true.
3. BAC performs DeleteObject one by one on all the instances returned.
Example 4-3 Multi-Instance Object Using delete in Pre-requisites of Configuration Template
The following example illustrates usage of multi-instance object using delete in pre-requisites of
configuration template:
<Configuration templateVersion="3.0">
<ParameterDictionaries>
<ParameterDictionary>tr196-cwmp-dictionary.xml</ParameterDictionary>
</ParameterDictionaries>
<Prerequisites>
<MaintenanceWindow>
<StartTime>00:00:00</StartTime>
<Duration>15:00</Duration>
</MaintenanceWindow>
<Expression>
<ParameterName>Device.Services.FAPService.{i}.REM.UMTS.GSM.Cell.{i}.BSIC
</ParameterName>
<InstanceConfiguration>
<Instance>
<Path>Device.Services.FAPService.{i}.REM.UMTS.GSM.Cell.</Path>
<Value>compare(LAC lessThanEquals 65534)</Value>
</Instance>
<Instance>
<Path>Device.Services.FAPService.</Path>
<Value>last()</Value>
</Instance>
<MatchCondition>OR</MatchCondition>
</InstanceConfiguration>
<Value>18</Value>
<Operator>matchAllIgnoreCase</Operator>
</Expression>
</Prerequisites>
<ObjectInstance name="Device">
<ObjectInstance name="Services">
<ObjectInstance name="FAPService">
<ObjectInstance sync-method="discovered" instance="last()">
<ObjectInstance name="REM.UMTS.GSM.Cell" sync-method="delete" instance="2">
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
</Configuration>
The behavior of BAC to apply the above template configuration during configuration sync is explained
below:
1. During configuration sync execution, BAC validates the time to ensure that the configuration sync
falls in the maintenance window
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-9
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Multi-Instance Object Support
2. Next, BAC validates the expression. Since the expression parameters are configured with
multi-instance object parameters, BAC first discovers and identify the instances to evaluate the
expression.
3. After the expression is evaluated to true, BAC discovers the instance for
Device.Services.FAPService. by using GetParameterNames RPC with next level set to true.
4. To discover the multi-instance object at next level, it issues GetParameterNames RPC for
Device.Services.FAPService.{last()}.REM.UMTS.GSM.Cell.
5. Finally, BAC issues DeleteObject Message for the instance in the second index in the returned array.
Example 4-4 Invalid Example-Adding a Template Without Instance Attribute
The following example illustrates adding a template without the instance attribute.
<tc:Template
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:tc="urn:com:cisco:bac:common-template"
xmlns="urn:com:cisco:bac:cwmp-template"
xsi:schemaLocation="urn:com:cisco:bac:common-template CommonTemplateConstructs.xsd">
<Configuration templateVersion="3.0">
<ParameterDictionaries>
<ParameterDictionary>tr196-parameter-dictionary.xml</ParameterDictionary>
</ParameterDictionaries>
<ObjectInstance name="Device">
<ObjectInstance name="Services">
<ObjectInstance name="FAPService">
<ObjectInstance name="{i}" sync-method="discovered"
instance="compare(DeviceType equals CWMP1)">
<ObjectInstance name="AccessMgmt">
<ObjectInstance name="MemberDetail">
<ObjectInstance name="{i}" sync-method="discovered">
<Parameter>
<Name>Enable</Name>
<Value>true</Value>
</Parameter>
<Parameter>
<Name>IMSI</Name>
<Value>310410268739757</Value>
</Parameter>
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
</Configuration>
</tc:Template>
When this template is added through API or admin UI, the following validation error is displayed:
Error: Template file validation has failed with the following error.
[Missing instance attribute for the sync-method 'discovered']
Firmware Rules Template
Earlier to this release, the expression support in the firmware rules was not flexible enough to handle
multi-instance objects in the parameter names. This enhancement is extended to firmware rules template
where BAC discovers the multi-instance parameters to evaluate the expression.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-10
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Multi-Instance Object Support
You can specify multi-instance parameter name in the expression, and the discover mechanism of these
objects can be configured using the newly introduce template element InstanceConfiguration.
Example 4-5 Multi-Instance Object in Expression
The following example illustrates usage of multi-instance object in expression:
<Expression>
<ParameterName>Device.Services.FAPService.{i}.REM.GSM.Cell.{i}.LAC
</ParameterName>
<InstanceConfiguration>
<Instance>
<Path>Device.Services.FAPService</ Path>
<Value>last()</Value >
</Instance>
<Instance>
<Path>Device.Services.FAPService.{i}.REM.GSM.Cell</ Path>
<Value>compare(PLMNID equals 123456)</Value >
</Instance>
<MatchCondition>OR</MatchCondition>
</InstanceConfiguration>
<Value>4660</Value>
<Operator>match</Operator>
</Expression>
In the above expression the multi-instance object parameter name
Device.Services.FAPService.{i}.REM.GSM.Cell.{i}.LAC is used. The InstanceConfiguration discovers
the multi-instance object instances Device.Services.FAPService.{i} and
Device.Services.FAPService.{i}.REM.GSM.Cell.{i}. The Value tag supports all the available instance
discover methods like all(), last(), compare(parameterName operation matchValue) and index. The new
tag MatchCondition is available in the instance configuration, which is used to evaluate the multiple
expressions only in case there are multiple instances discovered.
Example 4-6 Multi-Instance Object in Firmware Rule Template
The following example illustrates usage of multi-instance object in firmware rule template:
<tc:Template
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:tc="urn:com:cisco:bac:common-template"
xmlns="urn:com:cisco:bac:firmware-template"
xsi:schemaLocation="urn:com:cisco:bac:common-template CommonTemplateConstructs.xsd">
<FirmwareTemplate templateVersion="3.0">
<ParameterDictionaries>
<ParameterDictionary>tr196-cwmp-dictionary-v2.0.xml</ParameterDictionary>
</ParameterDictionaries>
<Prerequisites>
<MaintenanceWindow>
<StartTime>00:00:00</StartTime>
<Duration>15:00</Duration>
</MaintenanceWindow>
<Expression>
<ParameterName>Device.Services.FAPService.{i}.REM.UMTS.GSM.Cell.{i}.BSIC</ParameterName>
<InstanceConfiguration>
<Instance>
<Path>Device.Services.FAPService.{i}.REM.UMTS.GSM.Cell.</Path>
<Value>compare(LAC lessThanEquals 65534)</Value>
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-11
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Multi-Instance Object Support
</Instance>
<Instance>
<Path>Device.Services.FAPService.</Path>
<Value>last()</Value>
</Instance>
<MatchCondition>OR</MatchCondition>
</InstanceConfiguration>
<Value>18</Value>
<Operator>matchAllIgnoreCase</Operator>
</Expression>
<Expression>
<ParameterName>Device.Services.FAPService.{i}.REM.UMTS.GSM.Cell.{i}.PLMNID</ParameterName>
<InstanceConfiguration>
<Instance>
<Path>Device.Services.FAPService.</Path>
<Value>all()</Value>
</Instance>
<Instance>
<Path>Device.Services.FAPService.{i}.REM.UMTS.GSM.Cell.</Path>
<Value>2</Value>
</Instance>
<MatchCondition>OR</MatchCondition>
</InstanceConfiguration>
<Value>123451</Value>
<Value>123452</Value>
<Operator>matchIgnoreCase</Operator>
</Expression>
</Prerequisites>
<FirmwareRule name="FAPRule">
<Expression>
<InformParameterName>Inform.EventCode</InformParameterName>
<Value>1 BOOT</Value>
<Value>2 PERIODIC</Value>
<Operator>match</Operator>
</Expression>
<Expression>
<ParameterName>Device.Services.FAPService.{i}.REM.UMTS.GSM.Cell.{i}.BSIC</ParameterName>
<InstanceConfiguration>
<Instance>
<Path>Device.Services.FAPService.{i}.REM.UMTS.GSM.Cell.</Path>
<Value>1</Value>
</Instance>
<Instance>
<Path>Device.Services.FAPService.</Path>
<Value>compare(DeviceType equalsIgnoreCase fap)</Value>
</Instance>
<MatchCondition>OR</MatchCondition>
</InstanceConfiguration>
<Value>18</Value>
<Operator>matchAllIgnoreCase</Operator>
</Expression>
<InternalFirmwareFile>
<FileName>sample-firmware-image.bin</FileName>
<DeliveryTransport>service http 1</DeliveryTransport>
</InternalFirmwareFile>
</FirmwareRule>
</FirmwareTemplate>
</tc:Template>
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-12
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Multi-Instance Object Support
Parameter Discovery
Multi-instance object parameters can now be specified in the data discovery. This support is extended
for preregistered and unregistered devices.
Preregistered Devices
For preregistered devices, the multi-instance object parameters can be configured in the parameter
IPDeviceKeys.CWMP_CUSTOM_DISCOVER_PARAMETERSas in the example below:
/IPDevice/custom/discover/parameters=Device.Services.FAPService.{i}.REM.GSM.Cell.{i}.LAC,
Device.Services.FAPService.{i}.REM.GSM.Cell.1.PLMNID
Unregistered Devices
For unregistered devices, the multi-instance object parameters can be configured in the parameter
ServerDefaultsKeys.CWMP_UNKNOWN_CPE_PARAMETERSas in the example below:
/server/acs/unknown/parametersToRetrieve=
Device.Services.FAPService.{i}.REM.GSM.Cell.{i}.LAC,
Device.Services.FAPService.{i}.REM.GSM.Cell.1.PLMNID
Display Live Data Operation
The device operation enables you to view live device parameter values. The parameters retrieved from
the device are selected from a Parameter List file, which is an XML file that details all the parameters.
If the multi-instance object parameters are configured in the Parameter List XML file, the device
operation retrieves the parameter values from all the available instances in the device.
The following example illustrates the usage of multi-instance object support to retrieve live device data.
<ParameterList xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:noNamespaceSchemaLocation="ParameterListSchema.xsd">
<ParameterDictionaries>
<ParameterDictionary>tr196-cwmp-dictionary-v2.0.xml</ParameterDictionary>
</ParameterDictionaries>
<Parameter>
<Name> Device.Services.FAPService.{i}.REM.GSM.Cell.{i}.LAC</Name>
</Parameter>
<Parameter>
<Name> Device.Services.FAPService.{i}.REM.GSM.Cell.1.PLMNID </Name>
</Parameter>
<Parameter>
<Name>Device.Services.FAPService.{i}.REM.UMTS.GSM.CellNumberOfEntries</Name>
</Parameter>
</ParameterList>
Instance Sorting
In all the operations, when selecting the instances based on the instance configuration, you sort the list
of instances returned in GetParameterNames RPC call. The discovered object instances can be sorted
when the property ProvGroupKeys.ENABLE_INSTANCE_SORTING (/provGroup/enable/instanceSorting) is
enabled.
This property can be configured at the Provisioning Group level in the object hierarchy. For details, see
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-13
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Instruction Generation and Processing
Instruction Generation and Processing
Instruction generation is the process of generating specific instruction sets for CWMP devices. By using
technology extensions, through which device technologies are incorporated into Cisco BAC, device
details are combined with provisioning rules to produce instruction sets appropriate to the CPE. These
instructions are then forwarded to the DPEs in the device’s provisioning group and cached there.
The scriptable extensions are also supported in Cisco BAC. The extension points are defined in DPE for
running the java based extension scripts. These scripts are executed in DPE, whenever the device
establishes connection with the DPE. The extension scripts are added in the RDU database and
forwarded to the DPE cache. For more information on scriptable extension service, see Scripting
When a device is activated in a Cisco BAC deployment, it initiates contact with the Cisco BAC server.
After contact is established, the device’s preconfigured policy, based on configuration templates or
firmware rules templates associated with the device, determine the management actions undertaken by
the DPE.
This preconfigured policy determines the device’s level of service, also known as Class of Service.
Device configurations can include customer-required provisioning information, such as authentication
information, periodic inform rate, and Class of Service. This authoritative provisioning information for
the device is forwarded to DPEs from the RDU as device configuration instructions.
Instructions are logical operations which the DPE autoconfiguration server (ACS) performs for a
specific device. The instructions may map directly into a CWMP remote procedure call (RPC), for
example, GetParameterValues; or, they may combine additional logic with multiple CWMP RPCs, such
as firmware rules.
IGS could be controlled using the new API property, ApiCommandKeys.IGS_ENABLE. This property
determines whether IGS should be triggered or not. The API command uses this property to control the
regeneration of device configuration being affected by other API commands.
When this property is set to False in the map of associated properties of an API command, the command
skips the regeneration of the configuration process and it returns immediately with a warning message.
The API commands affected by this property are:
•
•
•
•
•
replaceFile
changeClassOfServiceProperties
changeProvGroupProperties
changeNodeProperties
changeDefaults
The RDU requests that instructions be processed, by passing “InstructionRecords” to the DPE. The DPE
server then converts these “InstructionRecords” to “Instructions”, and returns the results to the RDU
as “InstructionResponseRecords”.
Cisco BAC generates instructions through:
•
•
The Instruction Generation Extension—Generates “InstructionRecords” for a single device.
The Instruction Generation Service—Generates “InstructionRecords” for more than one device.
You can access statistics from the Instruction Generation Service from the administrator user
interface at Servers > RDU > View Regional Distribution Unit Details.
Among the various instructions that the RDU generates are:
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-14
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Instruction Generation and Processing
•
Data Synchronization Instruction (DataSyncRecord)—Keeps the RDU up-to-date on various CPE
parameters, such as the software version and the model name. These parameters may, in turn, be
used in generating other instructions, such as configuration instructions that are specific to a given
device type.
Some parameters are checked on every connection, while others are checked only when a change in
•
•
Routable IP Address Instruction (RoutableIPAddressRecord)—Discovers if a particular device is
reachable, enabling the DPE to create a TCP connection with a device in order to service a
connection request. The instruction retrieves the WAN IP address for the device, PPP or DHCP, and
compares it with the source IP address. If the IP addresses are different, the instruction updates the
RDU.
Firmware Rules Instruction (FirmwareRulesRecord)—Determines the firmware image to be
downloaded to a device. The firmware image files are associated to groups of devices by a firmware
rules template.
Cisco BAC uses the rules in the associated template to evaluate the firmware to be downloaded to
the CPE. This instruction takes effect only if the device has been associated with a firmware rules
template.
•
Configuration Synchronization Instruction (ConfigSyncRecord)—Triggers a synchronization of the
CPE configuration that is stored in the DPE cache. This instruction comes into effect only if the
device has been associated with a configuration template. The process of configuration
synchronization is explained in the subsequent section.
When the Signed Configuration feature is enabled, the RDU parses the ToBeSigned tag specified in the
configuration template and sets the corresponding value on the CWMP parameter object.
By default, the ToBeSigned flag on the CWMP parameter object is set to False. For more information
Device Configuration Synchronization
During the process of CPE configuration synchronization, a device’s configuration is automatically
synchronized based on the configuration template associated with the device’s Class of Service object.
The process of synchronizing the CPE configuration according to the ConfigSync instruction stored in
the DPE for this device is called Configuration Synchronization.
As part of this process, the DPE configures all parameters values and attributes found in the
configuration template associated with a device through its Class of Service, so that:
•
Notifications reflect those configured in the configuration template. For more information on
•
Access control for all parameters reflects that configured in the configuration template. For more
CPE configuration is associated with a unique configuration key. This configuration key is saved in the
DPE database, and is used as the ParameterKey parameter in RPCs that are forwarded to the CPE.
Every time the CPE establishes a connection with the DPE, the device reports the value for the
ParameterKey—in the form of a configuration revision number—by using the Inform message that the
device forwards to the DPE. The DPE compares this value with the one in its cache for the particular
device. A mismatch of the values, triggers the DPE and the device synchronization process.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-15
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Device Deployment in Cisco BAC
During the process of configuration synchronization:
1. The DPE receives a ParameterKey from the device. If the value of this ParameterKey matches the
one stored in the DPE, no synchronization is initiated. If the ParameterKey values differs, the
synchronization process continues.
2. If access control is set in its configuration, the DPE sets the AccessList parameter to ACS-only. The
access control feature is, by default, enabled. For more information on access control, see Access
3. If you enable the notification feature, the DPE sets notification attributes as specified in the device
configuration. Notifications are, by default, enabled. For more information on notifications, see
4. After the DPE configures the parameter values on the device according to the template, it sets a new
configuration revision number in the ParameterKey argument. This revision number is used to
determine if the device configuration is synchronized the next time the device and the DPE establish
a connection.
If the device connection with the DPE times out during the synchronization process, the CPE
attempts to reconnect to the DPE.
In this scenario, the value of the ParameterKey in the Inform message remains the same, because
only a successful synchronization process changes the ParameterKey value. When the CPE
reconnects to the DPE, the DPE initiates another round of synchronization with the original
ParameterKey value.
5. The synchronization process ends with the DPE forwarding the new value for the ParameterKey
attribute in its last update to the CPE.
In some situations, you must update the device even if the ParameterKey on the DPE matches the one on
the device.
To force a configuration synchronization:
Step 1
Step 2
From the Devices page, locate the device whose configuration you want to synchronize.
Click the Operations icon ( ) corresponding to the device.
The Device Operations page appears.
Step 3
Step 4
From the drop-down list under Perform Device Operation, select Force Configuration Synchronization.
Click Submit.
The device configuration is synchronized with the DPE.
Device Deployment in Cisco BAC
A Cisco BAC deployment is divided into provisioning groups, with each provisioning group responsible
only for a subset of the devices. All services provided by the provisioning group are implemented to
provide fault tolerance.
Note
A key principle of device management is that the RDU does not directly communicate with
devices. All device interactions are delegated to DPEs in the provisioning group to which the
device belongs.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-16
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Device Deployment in Cisco BAC
Cisco BAC provides two device deployment options, which can also be used in combination:
•
Preregistered—The device record is added to the RDU before the device makes initial contact with
the DPE, also known as the ACS.
•
Unregistered—The device makes contact with the DPE, before the device record is added to the
RDU.
Preregistered Devices
In this scenario, device data is preprovisioned into Cisco BAC, and the device is associated with a
specific Class of Service. The Class of Service can correspond to a service that the subscriber registered
for or a default configuration.
A preregistered device is preconfigured with certain parameters specific to the service provider. These
parameters are typically “burnt-in” as factory defaults.
Note
If you reset the device to factory defaults, the settings on the device revert to the preburnt configuration,
and the device may go through the reconfiguration process.
Device data is preregistered in Cisco BAC. This is typically done through the API; alternatively, it can
be done using the administrator user interface.
Preconfiguration involves three important issues:
•
The device must be able to establish network connectivity. For DSL devices, this typically involves
using auto-detection of ATM PVC and using PPP for authentication. The IP address is obtained
using PPP or using DHCP. Other devices typically use an existing internet connection and local
DHCP for address assignment.
•
•
CPE must contact the configuration servers of the appropriate service provider; in other words, the
CPE must know the ACS URL. The ACS URL can be preburnt into the device (assigned) or
discovered using DHCP from the WAN side.
The service provider must be able to associate the CPE with a specific subscriber. This process is
typically accomplished by the Operations Support Systems (OSS) application responsible for
subscriber registration. Cisco BAC is updated with appropriate data to provision device
configuration.
Unregistered Devices
In this scenario, no device data is prepopulated into Cisco BAC. Device data is added to Cisco BAC only
when the device first contacts a Cisco BAC server.
Cisco BAC allows unregistered devices (with no preconfigured parameters) to appear on a network and
gain default access. However, the lack of support for preregistering device data into Cisco BAC restricts
authentication options for unregistered devices, to using mechanisms based on certificates as opposed to
shared secrets.
The lack of preregistered data also means that Cisco BAC has to dynamically classify the devices and
determine the default configuration of a device.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-17
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Initial Provisioning Flows
Note
With no preregistered device data available, the chances of a Denial of Service attack increase, as
unknown devices are not authenticated.
Initial Provisioning Flows
This section describes the configuration workflow for a device, which differs based on whether a device
is preregistered or unregistered.
Figure 4-2 shows a common initial configuration flow.
Figure 4-2
System Operator
Populate Provisioning
Initial CPE Configuration Workflow
RDU
Provisioning Group
CPE
Rules
Add CPE (optional)
Generate Instruction
Set
Store Discovered
Data
Deliver Instruction Set
CPE Makes Protocol X response
Do I have Instructions?
Yes, Send Protocol X response
For Preregistered Devices
a. From the Cisco BAC API, the RDU is populated with specifically defined configurations and rules
for various types of devices. The device is preconfigured and associated with a Class of Service.
b. The preregistered device finds its provisioning group by contacting the Cisco BAC server at a
preconfigured URL, and initiates autoprovisioning with provisioning group servers (DPEs).
c. The RDU generates instructions appropriate for the device. The resulting device instructions direct
DPE responses to various CPE protocol events, such as a TR-069 Inform and an HTTP file request.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-18
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Initial Provisioning Flows
d. The device instruction set is forwarded to the DPE and cached there. Now, the DPE is programmed
to handle subsequent CPE protocol interactions for this device autonomously from the RDU. After
the device is added to the network and a configuration is generated for the device, the device boots
to allow the DPE to begin its interactions with the preregistered device.
e. During interactions with the device, additional information can be discovered and forwarded to the
RDU. In this case, the RDU may decide to generate new instructions and forward them to all DPEs.
For Unregistered Devices
a. From the Cisco BAC API, the RDU is populated with specifically defined configurations and rules
for various device types.
b. During bootup, when the DPE receives a device request, it performs a local search for instructions
cached for the specific CPE. Because the CPE has never previously contacted the DPE and because
device data was not preregistered into Cisco BAC, no instructions are found.
The DPE then packs all relevant CPE information into an “instruction set” generation request, and
forwards the request to the RDU. At the same time, the device request is rejected, forcing the device
to retry. Also, the device receives the configured SOAP request/response extensions from DPE cache
and the extensions are executed for the device. Unknown device extensions are configured in CWMP
defaults and are sent to DPE cache. For more information on configuring extensions for unknown
c. The RDU generates instructions appropriate for the CPE and distributes it to all DPEs within the
device’s provisioning group. The resulting CPE instructions direct DPE responses to various CPE
protocol events, such as a TR-069 Inform, and an HTTP file request.
d. The CPE is now registered and the details are stored in the RDU. The RDU captures the CPE
registration time. The property to retrieve the registered time is /IPDevice/registeredTime. This
property value can be obtained through the API IPDevice.getDetails() call.
e. The device instruction set is delivered to the DPE and cached there. Now, the DPE is programmed
to handle all subsequent CPE protocol interactions for this device autonomously from the RDU.
The following parameters are discovered by Cisco BAC for unknown devices:
•
•
•
•
•
•
•
•
Whether the device IP address is routable or NAT’ed.
Inform.DeviceId.Manufacturer.
Inform.DeviceId.ManufacturerOUI.
Inform.DeviceId.ProductClass.
InternetGatewayDevice.DeviceInfo.HardwareVersion.
InternetGatewayDevice.DeviceInfo.SoftwareVersion.
InternetGatewayDevice.DeviceInfo.ModelName.
InternetGatewayDevice.ManagementServer.ParameterKey.
Note
f. The device then reconnects, and receives the configuration instructions generated for it from the
RDU and cached at the DPE.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-19
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Assigning Devices to Provisioning Groups
Assigning Devices to Provisioning Groups
Devices can be assigned to a provisioning group in three ways: explicitly, automatically, or using a
combination of both.
Explicit Assignment
You can explicitly assign a device to a provisioning group. After devices appear in the default
provisioning group, the provisioning system may, using the API, assign the device to a new provisioning
group. On next contact with the device, Cisco BAC redirects the device.
To set the device to contact the assigned provisioning group, change the URL of the Cisco BAC server
to the URL of the provisioning group URL. The Cisco BAC server URL is stored, and from then on, the
device contacts Cisco BAC at the new address.
To move the device from one provisioning group to another, change the home provisioning group of the
device using the API or the administrator user interface. Each provisioning group has a URL associated
with it. To facilitate the move, on next contact, the ACS URL on the device is changed to the new
provisioning group URL.
Automatic Membership
If a device has not been explicitly assigned to a provisioning group, the device stays in the provisioning
group in which it is brought up. This allows a network-directed assignment of CPE to the provisioning
groups. You can use the automatic membership feature for roaming devices, enabling the local
provisioning group to service these devices when they are moved.
When a device appears in a new provisioning group, it is automatically assigned to the new provisioning
group, and the device data is purged from the old provisioning group. This process involves
communicating with the RDU, which, in turn, updates the DPEs in the old and new provisioning groups.
This is an expensive process; therefore, take care to prevent a large number of device migrations.
Automatic assignment of a device to a provisioning group works only if the DPEs are configured to allow
unknown (unregistered) devices that do not show up in any provisioning group.
If the devices do show up in another provisioning group and the provisioning group is configured to
allow access for unknown devices, Cisco BAC automatically assigns the device to the provisioning
group.
For details on how to configure access for unknown devices, see the Cisco Broadband Access Center 3.8
Combined Approach
You can explicitly assign devices and allow automatic membership of devices to a provisioning group.
For example, a generic unregistered device that appears on the network in a provisioning group is
automatically assigned to it. Subsequently, the OSS explicitly assigns the device to another provisioning
group by using the API.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-20
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Device Diagnostics
Device Diagnostics
CWMP supports device troubleshooting and diagnostics features that you use to focus on a single device
and collect diagnostics information for further analysis. This feature enables you to query devices for
any data, including:
•
•
•
•
•
Configuration
Live statistics
Fault indications
Log file
Diagnostics results
Device diagnostics is made possible in Cisco BAC through a set of operations that can be run on the
device. These include:
•
•
•
Reboot—Reboots the device. This reboot is primarily intended for diagnostic purposes.
Request Connection—Initiates a connection request with Cisco BAC.
Factory Reset—Resets a preregistered device settings to its original factory settings, to before a
subscriber-specific configuration was burnt in.
•
Display Live Data—Views device parameters directly from a device. You can define the parameters
you want to appear.
•
•
•
Ping Diagnostic—Enables you to perform an IP ping diagnostics test from the device to any host.
Force Firmware Upgrade—Forces a CPE to update its firmware.
Force Configuration Synchronization—Enables you to force an individual CPE to synchronize its
configuration.
For details on performing these device operations, see Performing Operations on Devices, page 16-14.
Cisco BAC also provides the following features to help troubleshooting:
•
•
•
Device History—Provides a detailed history of significant events that occur in a device provisioning
Device Faults—Detects devices with recurring faults, which can cause bottlenecks and affect
Device Troubleshooting—Provides detailed records of device interactions with Cisco BAC servers
for a set of devices that are designated for such troubleshooting. See Device Troubleshooting,
•
Performance Statistics—Provides detailed performance statistics that are related to system
performance across major components. It also provides an analysis of the statistical data to aid
Configuring SNMP Trap for CPEs
The fault management module of Cisco BAC facilitates CPEs to raise alarms and send events when any
fault occurs. The fault management module can be enhanced to support the SNMP trap facility. With the
SNMP trap facility, DPE receives the events from the CPEs and converts them into SNMP traps. DPE
further sends these SNMP traps to the trap receiver.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-21
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Configuring SNMP Trap for CPEs
The following components are configured in Cisco BAC for SNMP Trap facility:
•
•
•
DPE and Trap Receiver, see Configuration at DPE Level, page 4-22
Device, see Configuration at Device Level, page 4-23
Configuration at RDU Level
To configure RDU for SNMP trap facility:
Step 1
Create or update the BAC configuration template to support expedited and queued alarms.
The following parameters must be set in the configuration template:
•
For expedited alarms:
–
–
FAPService.{i}.FaultMgmt.SupportedAlarm.{i}.ReportingMechanism=0 {Expedited}
FAPService.{i}.FaultMgmt.ExpeditedEvent=Active
•
For Queued alarms
–
–
FAPService.{i}.FaultMgmt.SupportedAlarm.{i}.ReportingMechanism=1 {Queued}
FAPService.{i}.FaultMgmt.QueuedEvent=Active
For information on how to author configuration template, see Authoring Configuration Templates,
Step 2
Add this configuration template to the RDU database:
a. Log into the Cisco BAC admin UI.
b. Choose Configuration on the primary navigation bar.
c. Choose Files on the secondary navigation bar. The View Files page appears.
d. Click Add.
The Add Files page appears.
e. Choose Configuration Template from the File Type drop-down list.
f. Browse for the Source File Name.
g. Add the configuration template name in the File Name field.
h. Click Submit.
Step 3
Associate this configuration template with the required Class of Service. For details, see Configuring the
Configuration at DPE Level
To configure DPE for SNMP trap facility:
Step 1
Configure the SNMP alarm property values in the DPE. The following alarm property values must be
configured in the DPE to support SNMP trap:
•
•
•
AlarmIdentifier
AlarmRaisedTime
AlarmChangedTime
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-22
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Configuring SNMP Trap for CPEs
•
•
•
•
•
•
•
ManagedObjectInstance
EventType
ProbableCause
SpecificProblem
PerceivedSeverity
AdditionalText
AdditionalInformation
These SNMP alarm property values can be configured in dpe.properties file through DPE CLI. For
Step 2
Step 3
Customize the /cpeAlarm/alarmParams property in dpe.properties file to include SNMP alarm
property values. The SNMP alarm property values configured for this property are seen in the SNMP
traps.
The default setting for /cpeAlarm/alarmParams property is:
/cpeAlarm/alarmParams=EventTime,AlarmIdentifier,EventType,ProbableCause,PerceivedSeverity
Configure the trap receiver to receive the SNMP traps from the DPE. The trap receiver is added as SNMP
host with the required community and listening port. For information on how to add SNMP host and
Note
You can configure multiple trap receivers to receive SNMP traps from the CPEs.
Configuration at Device Level
To configure the device for SNMP trap facility:
Step 1
Modify the device property hierarchy to include the following properties:
•
•
•
/IPDevice/cpeAlarmTable
/IPDevice/cpeAlarm/prefixEID
/IPDevice/cpeAlarm/prefixCustomProp
Table 4-3 provides the significance of these properties along with the possible and default values.
Table 4-3
Properties - SNMP Trap Facility
Possible
values
Default
Values Description
Property
/IPDevice/cpeAlarmTable
None/Queued/ None
Expedited
None – BAC will not process any alarms in
the inform.
Queued – BAC will fetch all the alarms
from Queued alarm table in the inform and
send traps.
Expedited – BAC will fetch alarms from
Expedited alarm table in the inform and
send traps.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-23
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 CPE Management Overview
Configuring SNMP Trap for CPEs
Table 4-3
Properties - SNMP Trap Facility (continued)
Possible
values
Default
Values Description
Property
/IPDevice/cpeAlarm/prefixEID True/False
False
If set to true, then EID will be prefixed
with ManagedObject Instance and
AlarmIdentifier.
/IPDevice/cpeAlarm/prefixEID Any Custom
Property
-
If set, then the custom property will be
prefixed with the ManagedObject Instance
in the SNMP trap.
For details on how to add these properties in the device property hierarchy, see Modifying Device
Step 2
Step 3
Configure these properties to be available in /IPDevice/properties/available/pg.
Perform a force synchronization of the device with the DPE to update the device configuration. For
Step 4
Reboot the device and verify if the trap receiver receives the SNMP traps from the DPE.
The SNMP trap consists of the alarm property values. Table 4-4 describes the OIDs (Object Identifiers)
that are used in device MIB for these SNMP alarm property values.
Table 4-4
OID mapping
OID
.FaultMgmt.ExpeditedEvent.{i}.
AlarmIdentifier
.FaultMgmt.QueuedEvent.{i}.
AlarmIdentifier
cenAlarmInstanceID
cenAlarmTimestamp
EventTime
EventTime
cenAlarmManagedObject ManagedObjectInstance
Class
ManagedObjectInstance
cenAlarmDescription
cenUserMessage1
cenUserMessage2
EventType
EventType
ProbableCause
SpecificProblem
ProbableCause
SpecificProblem
PerceivedSeverity
cenAlarmSeverity/cenAlar PerceivedSeverity
mSeverityDefinition
cenUserMessage3
cenUserMessage3
AdditionalText
AdditionalText
AdditionalInformation
AdditionalInformation
NotificationType
cenAlarmStatusDefinition NotificationType
cenAlarmType
unknown(1), direct(2),
indirect(3), mixed(4)
unknown(1), direct(2), indirect(3),
mixed(4)
cenAlarmServerAddress
DPE address
DPE address
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
4-24
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
5
Configuration Templates Management
This chapter details the templates that Cisco Broadband Access Center (BAC) supports for device
configuration and device management.
This chapter includes the following sections:
•
•
•
•
Overview
Cisco BAC provides an extensible template-based mechanism to assign configurations for devices that
are compliant with the CPE WAN Management Protocol (CWMP). This template-processing mechanism
simplifies configuration management, enabling customized configurations for millions of customer
premises equipment (CPE) by using a small number of templates.
The result of processing a template is an instruction, which is forwarded to the DPEs in a device's
provisioning group. This instruction contains all the necessary information for the DPE to configure the
device.
Before attempting to create your own template file, familiarize yourself with information on:
•
•
By using Cisco BAC templates, you can create a template file in an easily readable format, and edit it
quickly and simply. You must add template files to the RDU by using the administrator user interface or
the API, before any Class of Service can reference it.
Cisco BAC templates are XML documents written according to a published schema. When instructions
are generated for a given device at the RDU for distribution to DPEs, a common template processor
retrieves a template by using the device’s Class of Service object.
It then evaluates the template values, such as Includes and Conditionals, and substitutes template
variables with their values. The resulting output is an XML object which represents a processed
template.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Overview
The syntax and content of the processed configuration template is validated when it is added to the Cisco
BAC system, ensuring that the XML template is well-formed. This validation also ensures that parameter
names and values are consistent with definitions in the parameter dictionary, an XML file that defines
Note
This type of validation occurs only when a template is added to the system or when the content of an
existing template is replaced
Cisco BAC uses the XML schemas that are defined in various files to generate instructions for device
Table 5-1
Files Used in Configuration Template Processing
File
Purpose
Options Available in Cisco BAC
Configuration Defines device configuration
Sample templates
Template
Samples
Sample templates are located at:
<BPR_HOME>/rdu/samples/cwmp
Configuration Validates configuration template syntax
Default template schemas
Template
Schema
Default template schemas are located at:
•
CWMP configuration schema
<BPR_HOME>/rdu/templates/cwmp/schema/CwmpTemplateConstructs.xsd
•
Common template schema
<BPR_HOME>/rdu/templates/cwmp/schema/CommonTemplateConstructs.xsd
Parameter
Dictionary
Validates configuration template content
Default dictionaries
Custom dictionaries
Default dictionaries are located at:
•
•
•
•
•
•
•
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr069-cwmp-dictionary.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr098-cwmp-dictionary.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr104-cwmp-dictionary.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr106-cwmp-dictionary.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr196-cwmp-dictionary-v1.1.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr196-cwmp-dictionary-v2.0.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr196-cwmp-dictionary-IGD-v1.1.
xml
•
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr196-cwmp-dictionary-IGD-v2.0.
xml
•
<BPR_HOME>/rdu/templates/cwmp/dictionary/basic-cwmp-dictionary.xml
Parameter
Dictionary
Schema
Validates parameter dictionary syntax
Default dictionary
Parameter dictionary schema is located at:
Schema for TR-069, TR-098, TR-104, TR-106, TR-181, and TR-196 dictionaries
<BPR_HOME>/rdu/templates/cwmp/schema/TemplateDictionarySchema.xsd
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Overview
Cisco BAC supports multiple instance object which is available in the configuration template. This
facilitates discovering and updating parameters for the selective object instances without specifying the
object instance number. For more information on multi-instance object support see, Multi-Instance
You can manage template files, configuration and firmware rules, by using the administrator user
interface.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Features of Cisco BAC Templates
Features of Cisco BAC Templates
A configuration template is a collection of Objects and Parameters. In a TR-069 device,
InternetGatewayDevice is the root object, while in TR-106 device, Device is the root object. In a TR-196
device, InternetGatewayDevice or Device is the root object.
Figure 5-1 illustrates the schema of a TR-069 device Configuration. Each element featured in the schema
is described in subsequent sections.
Figure 5-1
Configuration Schema
cwmp:ParameterDictionaries
cwmp:Prerequisites
cwmp:ParameterDictionary
attributes
cwmp:ObjectInstance
This represents an instance
of a CPE node.
The attribute "name" is
mandatory and represents
name of this node instance.
Name of the ObjectInstance
is validated using dictionary.
cwmp:ObjectInstance
Configuration
This is the root element.
This can have one or more
ObjectInstances.
1..
This represents an instance
of a CPE node.
The attribute "name" is
cwmp:Notification
mandatory and represents
name of this node instance.
Name of the ObjectInstance
is validated using dictionary.
Indicates whether the CPE
should include changed
values of the specified
parameter in the Inform
message, and whether the
CPE must initiate a session
to the ACS when the
0..
specified parameter(s)
change their value.
1..
cwmp:AccessControl
Array of zero or more
entries for which write
access to the specified
Parameter is granted. If
there are no entries, write
access is only allowed from
an ACS.
tc:include
1..
cwmp:Parameter
Parameter element
describes a CPE
Parameter. It must have a
Value, Notification, or
ToBeSigned tag.
tc:if
tc:choose
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Features of Cisco BAC Templates
A configuration template comprises the following components:
•
ObjectInstance—Represents an instance of a TR-069 CPE node. You must specify the object’s
‘name.’
An object may include other objects and parameters, both of which, in turn, may include other
elements in line with the TR-069 specification.
A CPE object may contain:
–
–
Object—Describes an instance of a CPE node.
Parameters—Describes a CPE parameter and must have a value, and Notification, Access
–
–
Notification—Enables notification of changes in the value on all child parameters of this
Access Control—Controls whether or not entities other than the autoconfiguration server (user,
SNMP, UPnP, and so on) can change values of any configuration parameters under this object.
•
•
Parameter Dictionary—Contains definitions used to validate the objects and parameters in
configuration templates. Cisco BAC supports only one dictionary per template. (See Parameter
Prerequisites—Optionally, indicates the conditions that must be met before a device can be
configured. These conditions may include:
–
–
MaintenanceWindow—Enables you to specify the time that a configuration is to be applied to
a device.
Expressions—Enable you to specify any parameters that need to match on the device as a
prerequisite to applying the configuration; for example, a particular software or hardware
version of a device.
Adding a configuration template to Cisco BAC would fail if there are errors in the template. To avoid
configuration errors, ensure that all:
•
•
•
Object names and parameter names exist in the parameter dictionary.
Parameter values are of the type specified in the parameter dictionary.
Parameters that are not writable do not have a value. However, they may have the Notification,
Access Control attributes, or both set.
•
Substitutable variables are defined in the system through Cisco BAC custom property or device
property.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Features of Cisco BAC Templates
Parameters
This section describes the schema associated with parameter objects in the configuration templates (see
Figure 5-2
Parameter Schema
cwmp:Name
Name is the name of a
CPE Parameter. This
is validated using
parameter dictionary.
cwmp:Value
Value is data for the
Parameter. Data type
is validated using
parameter dictionary.
cwmp:ComplexValue
ComplexValue is data
for the Parameter.
cwmp:Parameter
Parameter element
describes a CPE
Parameter. It must have
a Value, Notification, or
ToBeSigned tag.
cwmp:Notification
Indicates whether the
CPE should include
changed values of the
specified parameter in the
Inform message, and
whether the CPE must
initiate a session to the
ACS when the specified
parameter(s) change in
value.
cwmp:AccessControl
Array of zero or more
entities for which write
access to the specified
Parameter is granted. If
there are no entries, write
access is only allowed
from an ACS.
The CPE parameter contains a name-value pair:
The name identifies the parameter, and has a hierarchical structure similar to files in a directory, with
each level separated by a dot (.). Each level corresponds to an object instance: Some objects have a single
instance or singletons, other objects have multiple instances. The parameter lists for both object
instances are described in subsequent sections.
The value of a parameter may be one of several data types defined in the TR-069 specification. These
data types are string, int, unsignedInt, boolean, dateTime, and base64, each of which is validated by
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Features of Cisco BAC Templates
Example 5-1 illustrates how you can configure values for a parameter:
Example 5-1 Configuring Parameter Values
<tc:Template
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:tc="urn:com:cisco:bac:common-template"
xmlns="urn:com:cisco:bac:cwmp-template"
xsi:schemaLocation="urn:com:cisco:bac:common-template CommonTemplateConstructs.xsd">
<Configuration>
<ParameterDictionaries>
<ParameterDictionary>tr069-cwmp-dictionary.xml</ParameterDictionary>
</ParameterDictionaries>
<ObjectInstance name="InternetGatewayDevice">
<ObjectInstance name="ManagementServer">
<Parameter>
<Name>PeriodicInformEnable</Name>
<Value>true</Value>
</Parameter>
<Parameter>
<Name>PeriodicInformInterval</Name>
<Value>86400</Value>
</Parameter>
</ObjectInstance>
</ObjectInstance>
</Configuration>
</tc:Template>
Parameter List for Single Instance Object
This is an example of a single instance, or singleton:
InternetGatewayDevice.UserInterface.
The parameters of a singleton can be represented as:
InternetGatewayDevice.UserInterface.PasswordRequired = true
InternetGatewayDevice.UserInterface.ISPName = SBC
Parameter List for Multiple Instance Objects
The TR-069 specification defines some objects that can have multiple instances, with each instance
assigned a number. You use the parameter dictionary to define the objects that can have multiple
instances.
For example, InternetGatewayDevice.Layer3Forwarding.Forwardingis a multiple instance object.
Two instances of that object can be represented as described:
InternetGatewayDevice.Layer3Forwarding.Forwarding.1.Enable = true
InternetGatewayDevice.Layer3Forwarding.Forwarding.2.Enable = false
Note
Instance numbers are generated by the device. A parameter dictionary uses {i} to represent the objects
which can have multiple instances. Configuration templates must use the actual instance number to
indicate the object which is being modified, such as InternetGatewayDevice.WANDevice.1.
WANConnectionNumberOfEntries.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Features of Cisco BAC Templates
Notification
By using the Cisco BAC Notification attribute, a device can notify the DPE of parameter value changes.
Notifications, by default, are turned off.
If Notification is enabled, it specifies that a device should include the changed values of a particular
parameter in the device Inform message to the DPE, and that the device must initiate a session to the
DPE whenever the value of that particular parameter is changed.
Cisco BAC supports the following values for the Notification attribute as defined in the TR-069
specification:
• Off—Notification set to off.
The device need not inform Cisco BAC of a change to the specified parameter(s).
• Passive—Notification set to Passive.
Whenever the specified parameter value changes, the device must include the new value in the
ParameterList in the Inform message that is sent the next time that Cisco BAC establishes a session.
• Active—Notification set to Active.
Whenever the specified parameter value changes, the device must initiate a session with Cisco BAC,
and include the new value in the ParameterList in the associated Inform message. Whenever a
parameter change is sent in the Inform message due to a nonzero Notification setting, the Event code
4 VALUE CHANGEmust be included in the list of Events.
Note
The device returns a notification request rejectederror if an attempt is made to set Notification on
a parameter deemed inappropriate; for example, a continuously varying statistic.
Configuring Notification
The following example illustrates how you can configure the Notification attribute.
In this example, a configuration file is defined and generated for a UserInterfaceobject, with
Notification set to Activefor all parameters. The ISPNameparameter overrides this Notification and sets
it to Passive.
<!--Set Notification of object InternetGatewayDevice.UserInterface.-->
<ObjectInstance name="InternetGatewayDevice">
<ObjectInstance name="UserInterface">
<Notification>Active</Notification> <!-- applies to all parameters under this
object -->
<Parameter>
<Name>PasswordRequired</Name>
<Value>true</Value>
</Parameter>
<Parameter>
<Name>WarrantyDate</Name>
<Value>2001-02-23T09:45:30+04:30</Value>
</Parameter>
<Parameter>
<Name>ISPName</Name>
<Value>SBC</Value>
<Notification>Passive</Notification> <!--applies to only this parameter-->
</Parameter>
<Parameter>
<Name>ISPHomePage</Name>
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-8
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Features of Cisco BAC Templates
<Value>www.sbc.com</Value>
</Parameter>
</ObjectInstance>
</ObjectInstance>
Access Control
Access control in Cisco BAC is enabled through the AccessControl attribute of the CPE that you can
control by using configuration templates. CPE parameters can be changed using LAN autoconfiguration
protocol if access control is set to allow such access. For instance, if the AccessControl attribute is set
to Subscriber, then the subscriber on the LAN can change the parameter value.
The value of the AccessControl attribute is an array of zero or more entities for which writeaccess to a
specific parameter is granted. If no entries are present, only updates to the parameter value are allowed
from Cisco BAC.
Cisco BAC defines only one entity in this list, in line with the TR-069 specification: Subscriber. This
enables write access by the subscriber on the LAN, such as through the LAN-side DSL CPE
Configuration protocol or through the UPnP protocol.
Configuring Access Control
The following example illustrates how to set access control in Cisco BAC by using configuration
templates:
<ObjectInstance name="InternetGatewayDevice">
<ObjectInstance name="ManagementServer">
<AccessControl> <!--Allow LAN-side updates of this object and parameters
under it -->
<Entity>Subscriber</Entity>
</AccessControl>
<Parameter>
<Name>PeriodicInformEnable</Name>
<Value>true</Value>
</Parameter>
<Parameter>
<Name>PeriodicInformEnable</Name>
<AccessControl/>
</Parameter>
<!-- Allow updates only from ACS (BAC) -->
</ObjectInstance>
</ObjectInstance>
Prerequisites
Cisco BAC templates include a prerequisites option, which indicates what conditions must be met before
configuring the device. For example, a prerequisite may specify that the device to which you apply a
configuration must meet the requirement of a specific hardware or software version.
Prerequisite rules are embedded into an instruction, which is sent to the DPE. The DPE then interrogates
the device as necessary to determine if the prerequisites match.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-9
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Features of Cisco BAC Templates
Figure 5-3 illustrates the schema of the prerequisites option:
Figure 5-3 Prerequisite Schema
cwmp:StartTime
This is Time of Day:
hh:mm:ss. [ 13:04:05 ]
cwmp:MaintenanceWindow
cwmp:Duration
hh:mm
This represents the time window
when this configuration can be
applied to a device.
cwmp:DayOfWeek
0..7
This is Day of week
when the configuration
is applicable. Absence
of this tag indicates that
MaintenanceWindow is
applicable to all days of
week.
cwmp:InformParameterName
cwmp:ParameterName
cwmp:Prerequisites
ParameterName is the full name of
a CPE Parameter. This is validated
using parameter dictionary.
cwmp:RpcArgumentName
This specifies either
RequestDownload.FileType or
RequestDownload.FileTypeArg\* .
Values for these parameters may
be provided by CPE when it
requests a download.
cwmp:Expression
cwmp:Value
0..
1..
This represents a condition
that must be met before
this configuration can be
applied to a device.
Value is data for the
Parameter. Data type
is validated using
parameter dictionary.
cwmp:Operator
You use prerequisites to manipulate configuration generation through:
•
•
Expressions
MaintenanceWindow
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-10
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Features of Cisco BAC Templates
Expressions
Expressions are conditionals that use information from device properties. They may use Parameters,
InformParameters or rpcArguments. Expressions are used within prerequisites and firmware rules and
are processed when a device contacts Cisco BAC to retrieve its configuration.
If the expressions that you specify evaluates to true, the condition(s) is met, and the corresponding
configuration or firmware rule is applied to the device. For detailed information, see Using Conditionals,
The Prerequisites tag may contain zero or more expressions.
SendHttpErrorOnFail
When the prerequisites specified in the configuration template are not met, and the sendHttpErrorOnFail
attribute is set, an HTTP error with the specified code is sent to the device, and the corresponding
configuration is not applied to the device.
Example 5-2 Configuring Prerequisite - sendHttpErrorOnFail
In this example, when the software version of the device is not 1.1, an HTTP error code is sent to the
device.
<Prerequisites sendHttpErrorOnFail=”503”>
<Expression>
<ParameterName>InternetGatewayDevice.DeviceInfo.SoftwareVersion</ParameterName>
<Value>1.1</Value>
<Operator>match</Operator>
</Expression>
</Prerequisites>
MaintenanceWindow
Use the MaintenanceWindow setting to specify the time window within which you want to apply a
particular configuration to a specific CPE. This evaluation is performed at the DPE on device contact;
as such, the DPE local time is used.
Note
You should configure the server on which the DPE runs with automatic time server synchronization, such
as NTP.
MaintenanceWindow comprises:
•
•
•
StartTime—Specifies a time value indicating the beginning of a maintenance window. This value is
defined as hh:mm:ss.
Duration—Specifies a time value indicating the duration from StartTime when the configuration can
be applied. This value is defined as hh:mm.
DayOfWeek—Specifies the days of the week when you can apply the configuration. Absence of this
tag indicates that the rule is valid for all days of the week. This tag is optional.
You can use these elements to specify the time window when this rule can run, thus providing the ability
to limit configuration upgrades to late in the night when subscribers are most likely sleeping.
The Prerequisites tag may contain zero or one MaintenanceWindow.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-11
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Features of Cisco BAC Templates
Example 5-3 Configuring MaintenanceWindow
In the following example, the values of the StartTime, Duration, and DayOfWeek tags define the period
when this rule is in effect. This template takes effect at 1 a.m. for a period of 5 hours, on every Monday,
Tuesday, and Friday.
<Prerequisites>
<MaintenanceWindow>
<StartTime>01:00:00</StartTime>
<Duration>05:00</Duration>
<DayOfWeek>Monday</DayOfWeek>
<DayOfWeek>Tuesday</DayOfWeek>
<DayOfWeek>Friday</DayOfWeek>
</MaintenanceWindow>
<Prerequisites>
Device Contact During MaintenanceWindow
A key concept in MaintenanceWindow is ensuring that devices contact Cisco BAC during the window.
You can configure the devices to contact the DPE at a given date and time, by setting a value for the
PeriodicInformTime variable in the configuration template. Also, set the RandomDateTimeInRange tag
to designate a time range when the device can contact Cisco BAC.
Example 5-4 Configuring Device to Contact Cisco BAC During MaintenanceWindow
In the following example, the device contacts Cisco BAC for the first time on January 1, 2007, between
3 a.m. and 4 a.m. After the initial contact, the device continues to contact Cisco BAC every 30 minutes.
• PeriodicInformEnableis set to true to indicate that the device must periodically send device
information to Cisco BAC using the Inform method call.
• PeriodicInformIntervalis set to 30 minutes (1800 seconds), requesting the device to attempt to
contact Cisco BAC every 30 minutes. This duration is the interval within which the device attempts
to connect with Cisco BAC if PeriodicInformEnableis true.
• PeriodicInformTimeis set to a date and time when the device should initiate contact with Cisco
BAC.
<ObjectInstance name="InternetGatewayDevice">
<ObjectInstance name="ManagementServer">
<Parameter>
<Name>PeriodicInformEnable</Name>
<Value>true</Value>
</Parameter>
<Parameter>
<Name>PeriodicInformInterval</Name>
<Value>1800</Value>
</Parameter>
<Parameter>
<Name>PeriodicInformTime</Name>
<ComplexValue>
<RandomDateTimeInRange>
<StartDateTime>2006-01-27T01:00:00+03:00</StartDateTime>
<RandomizationIntervalMinutes>60</RandomizationIntervalMinutes>
</RandomDateTimeInRange>
</ComplexValue>
</Parameter>
</ObjectInstance>
</ObjectInstance>
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-12
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Features of Cisco BAC Templates
For detailed information on PeriodicInformInterval, see the Broadband Forum’s Technical Report on
TR-069.
You can initiate a firmware upgrade in a similar fashion. Firmware upgrades are typically carried out
only within a specific time range. After defining a firmware rule template with the MaintenanceWindow
option set, associate the firmware rule template to a Class of Service object by using the administrator
user interface.
After you finish this task, the firmware rule is pushed to the DPE. The DPE evaluates the firmware rule
and ensures that the firmware upgrade is executed during the specific time.
Configuring Prerequisites
This section illustrates how to configure the prerequisite option.
Example 5-5 Configuring Prerequisites - Maintenance Window
In this example, the prerequisite indicates that this template will come into effect at 1 a.m. for a duration
of 5 hours. During this time, this template can be applied to any device that contacts Cisco BAC and has
an EventCodeof 1 BOOT and the manufacturer as Acme, Inc.
Example 5-6 Prerequisite Using Expression
<Prerequisites>
<MaintenanceWindow>
<StartTime>01:00:00</StartTime>
<Duration>5:00</Duration>
</MaintenanceWindow>
<Expression>
<InformParameterName>InternetGatewayDevice.DeviceInfo.EventCode</InformParameterName>
<Value>1 BOOT</Value>
<Operator>match</Operator>
</Expression>
<Expression>
<ParameterName>InternetGatewayDevice.DeviceInfo.Manufacturer</ParameterName>
<Value>Acme, Inc</Value>
<Operator>matchIgnoreCase</Operator>
</Expression>
</Prerequisites>
Example 5-7 Prerequisite Using Regular Expression (Regex)
<Prerequisites>
<MaintenanceWindow>
<StartTime>01:00:00</StartTime>
<Duration>5:00</Duration>
</MaintenanceWindow>
<Expression>
<InformParameterName>Inform.EventCode</InformParameterName>
<Value>^[0-9]\s\w</Value>
<Operator>regexMatch</Operator>
</Expression>
</Prerequisites>
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-13
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Authoring Configuration Templates
Authoring Configuration Templates
You can use Cisco BAC to generate instructions for customized configurations for many devices from a
single template by using template constructs. Parameter substitution and conditional inclusion or
exclusion of template content, controlled by values from the Cisco BAC property hierarchy, create a
custom configuration from a template. A template may include other templates, providing a mechanism
to reuse common configurations.
You must add template files to the RDU by using the administrator user interface or the API, before any
Class of Service can reference it.
Note
The XML elements in a template are divided into two groups:
•
•
Elements that are not prefixed by tc are unique to configuration templates.
Elements prefixed by tc are generic constructs that are the same for configuration templates and for
firmware rule templates.
A configuration template, with Configurationas the root element, must follow a structure similar to
Example 5-8 Sample Configuration Template
<tc:Template
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:tc="urn:com:cisco:bac:common-template"
xmlns="urn:com:cisco:bac:cwmp-template"
xsi:schemaLocation="urn:com:cisco:bac:common-template CommonTemplateConstructs.xsd">
<Prerequisites>
<MaintenanceWindow>
<StartTime>01:00:00</StartTime>
<Duration>2:30</Duration>
</MaintenanceWindow>
<Expression>
<ParameterName>InternetGatewayDevice.DeviceInfo.Manufacturer</ParameterName>
<Value>Acme, Inc</Value>
<Operator>matchIgnoreCase</Operator>
</Expression>
</Prerequisites>
<Configuration>
<ParameterDictionaries>
<ParameterDictionary>tr069-cwmp-dictionary.xml</ParameterDictionary>
</ParameterDictionaries>
<ObjectInstance name="InternetGatewayDevice">
<ObjectInstance name="ManagementServer">
<Parameter>
<Name>PeriodicInformEnable</Name>
<Value>true</Value>
</Parameter>
<Parameter>
<Name>PeriodicInformInterval</Name>
<Value>86400</Value>
</Parameter>
</ObjectInstance>
</ObjectInstance>
</Configuration>
</tc:Template>
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-14
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Authoring Configuration Templates
Configuration templates support:
•
•
•
Parameter substitution—Substitutes values from the Cisco BAC property hierarchy into XML
Includes—Build a set of reusable template snippets. Includes are useful for defining options that are
common across many service classes without having to duplicate the options in several templates.
Conditionals—Include or exclude blocks of text within a template. The text blocks that you can
enclose within the conditional statements are limited to parameter and object instance elements. (For
Custom Properties
Cisco BAC properties provide access to data that is stored in Cisco BAC using the API. Using the API,
you can use the properties of corresponding objects to retrieve preprovisioned, discovered, and status
data. You can use properties to configure Cisco BAC at the appropriate level of granularity (from system
You can use custom properties to define additional customizable device information to be stored in the
RDU database. You typically use these properties to substitute parameter values in configuration
templates and firmware rule templates.
The template parser works from the bottom up while locating properties in the hierarchy (device first,
followed by the Group, provisioning group, then the Class of Service, device type, and system defaults)
and converts the template option syntax.
For details on substituting template parameters using the VAR()construct, see the subsequent section.
Example 5-9 Retrieving Username or Password from Device
The following example illustrates how you can use templates to retrieve properties from different levels;
for instance, username and password credentials from a device.
<tc:Template>
<Configuration>
<ParameterDictionaries>
<ParameterDictionary>tr069-cwmp-dictionary.xml</ParameterDictionary>
</ParameterDictionaries>
<ObjectInstance name="InternetGatewayDevice">
<ObjectInstance name="ManagementServer">
<Parameter>
<Name>PeriodicInformEnable</Name>
<Value>true</Value>
</Parameter>
<Parameter>
<Name>PeriodicInformInterval</Name>
<Value>20</Value>
<Notification>Active</Notification>
</Parameter>
<Parameter>
<Name>ConnectionRequestUsername</Name>
<Value>VAR(name=/dt/username, defaultValue="User")</Value>
</Parameter>
<Parameter>
<Name>ConnectionRequestURL</Name>
<Value>VAR(name=/dt/pk, defaultValue="http://testURL")</Value>
</Parameter>
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-15
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Authoring Configuration Templates
</ObjectInstance>
</ObjectInstance>
</Configuration>
</tc:Template>
To configure custom properties from the administrator user interface, choose the Configuration >
Custom Property tabs. Use the Add Custom Property page to add or delete custom properties. For
Caution
If you remove custom properties that a template references, the RDU fails to generate instructions for a
device.
Using Parameter Substitution
Values from the Cisco BAC property hierarchy are substituted into a template by using the VAR()
construct, to produce a custom configuration from a configuration template. The VAR() construct can
appear in an XML element value or element attribute. You can also use it to substitute full or partial
values.
The following list describes the constructs that Cisco BAC supports for parameter substitution:
•
•
•
•
•
Cisco BAC property value into XML element content
Cisco BAC property value into XML element attribute
Default value
XML partial element content
Values with special characters
Syntax Description
VAR(token=someChar, name=someProperty, defaultValue=someValue)
•
token—Specifies the character that delimits subsequent fields. This element is optional and defaults
to a comma (,).
Note
If the default value contains a comma (,), then start the VAR()construct by specifying a token
character. This token must not appear in the default value. Also, ensure that the token
character precedes the VAR end bracket.
•
•
name—Specifies the name of the custom property to be substituted or the Standard Device
properties to be referenced.
defaultValue—Specifies the value to use if the referenced property is not available.
Example 5-10 Setting a Value to a Cisco BAC Custom Property
<Value>VAR(name=/cpe/version, defaultValue=4)</Value>
Example 5-11 Referencing Standard Device Property
<Value>VAR(name=/IPDevice/connectionRequestPath, defaultValue="http://test")</Value>
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-16
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Authoring Configuration Templates
Note
The API constant for /IPDevice/connectionRequestPath is
IPDeviceKeys.CONNECTION_REQUEST_PATH.
Example 5-12 Using a defaultValue With a Comma
<Value>VAR(token=;;name=/cpe/usrStr; defaultValue=4,5;)</Value>
Example 5-13 Creating a String Value based on a Cisco BAC Property
<Value>CWMP_VAR(name=/cpe/version, defaultValue=4).bin</Value>
If cpe/versionis 1-08 then the Value will be CWMP_1-08.bin.
Using Includes
Include files let you build a set of reusable template snippets. These files are useful for defining options
that are common across many service classes without having to duplicate the options in several
templates.
You can include the content of a particular file into a template by using the tc:include construct. After
inserting the content of included files into the host template, the parameter dictionary that is specified
in the host template validates the content of the resulting template.
Note
Note
If included templates use objects and parameters not defined in the same dictionary as the host template,
parameter validation fails during instruction generation.
The tc:Include element specifies the href attribute, where href identifies the name of the Cisco BAC
template file that is included in the host template. Use double quotation marks (") when using an include
directive in template.
Ensure that Include files are of the same file type as the template. For instance, when adding a
configuration template, all the included files must be of the Configuration Template file type.
Example 5-14 Include Files
The following example displays the content of a host template, and an included template.
Included Template: informInterval.xml
<!-- enable and set Periodic Inform value -->
<tc:Template :xsi="http://www.w3.org/2001/XMLSchema-instance"
:tc="urn:com:cisco:bac:common-template" ="urn:com:cisco:bac:cwmp-template"
:schemaLocation="urn:com:cisco:bac:common-template CommonTemplateConstructs.xsd">
<Configuration>
<ParameterDictionaries>
<ParameterDictionary>tr069-cwmp-dictionary.xml</ParameterDictionary>
</ParameterDictionaries>
<ObjectInstance name="InternetGatewayDevice">
<ObjectInstance name="ManagementServer">
<Parameter>
<Name>PeriodicInformEnable</Name>
<Value>true</Value>
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-17
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Authoring Configuration Templates
</Parameter>
<Parameter>
<Name>PeriodicInformInterval</Name>
<Value>30</Value>
</Parameter>
</ObjectInstance>
</ObjectInstance>
</Configuration>
</tc:Template>
Host Template: cwmp-config.xml
<!-- set Periodic Inform value based on content of informInterval-cwmp.xml -->
<!-- set ManagmentServer.URL -->
<tc:Template :xsi="http://www.w3.org/2001/XMLSchema-instance"
:tc="urn:com:cisco:bac:common-template" ="urn:com:cisco:bac:cwmp-template"
:schemaLocation="urn:com:cisco:bac:common-template CommonTemplateConstructs.xsd">
<Configuration>
<ParameterDictionaries>
<ParameterDictionary>tr069-cwmp-dictionary.xml</ParameterDictionary>
</ParameterDictionaries>
<tc:include href="informInterval.xml"/>
<ObjectInstance name="InternetGatewayDevice">
<ObjectInstance name="ManagementServer">
<Parameter>
<Name>URL</Name>
<Value>http://10.44.64.200:9595/acs</Value>
</Parameter>
</ObjectInstance>
</ObjectInstance>
</Configuration>
</tc:Template>
Template After Inserting Included File: informInterval.xml
<!-- set ManagmentServer.URL -->
<tc:Template :xsi="http://www.w3.org/2001/XMLSchema-instance"
:tc="urn:com:cisco:bac:common-template" ="urn:com:cisco:bac:cwmp-template"
:schemaLocation="urn:com:cisco:bac:common-template CommonTemplateConstructs.xsd">
<Configuration>
<ParameterDictionaries>
<ParameterDictionary>tr069-cwmp-dictionary.xml</ParameterDictionary>
</ParameterDictionaries>
<ObjectInstance name="InternetGatewayDevice">
<ObjectInstance name="ManagementServer">
<Parameter>
<Name>PeriodicInformEnable</Name>
<Value>true</Value>
</Parameter>
<Parameter>
<Name>PeriodicInformInterval</Name>
<Value>30</Value>
</Parameter>
</ObjectInstance>
</ObjectInstance>
<ObjectInstance name="InternetGatewayDevice">
<ObjectInstance name="ManagementServer">
<Parameter>
<Name>URL</Name>
<Value>http:// 10.44.64.200:9595/acs</Value>
</Parameter>
</ObjectInstance>
</ObjectInstance>
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-18
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Authoring Configuration Templates
</Configuration>
</tc:Template>
Using Conditionals
Cisco BAC supports powerful conditional expressions in template constructs to provide ultimate
configuration customization.
You can use conditional expression constructs to include or exclude blocks of text within a template.
These construct elements are tc:if, tc:choose, and tc:when. You use the tc:if construct for simple single
conditionals.
You can use a combination of tc:choose, tc:when, and tc:otherwise for a logical if...else if...else
construct. The tc:if and the tc:when constructs require a test attribute. A test attribute is an expression
that can be evaluated, and the resulting object can be converted to a Boolean operator (true or false).
The tc:choose element selects one from a number of possible alternatives. This element contains a
sequence of tc:when elements, followed by an optional tc:otherwise element. Each tc:when element
has a single attribute, test, which specifies an expression.
The content of the tc:when and the tc:otherwise elements is a valid template segment. When a tc:choose
element is processed, each of the tc:when elements is tested in turn, by evaluating the expression and
converting the resulting object to a Boolean operator.
The content of the first—and only the first—tc:when element whose test is true is instantiated. If no
tc:when is true, the content of the tc:otherwise element is instantiated. If no tc:when element is true
and no tc:otherwise element is present, nothing is created.
Note
Within expressions, you can use single (‘) or double quotes (“) to delimit literal strings. The template
processor interprets a quotation mark (‘ or “) as terminating the attribute. To avoid this problem, you can
expression can use single quotes (‘) if the attribute is delimited with double quotes (“) or vice-versa.
Table 5-2 lists the conditional template constructs that this Cisco BAC release supports.
Table 5-2
Conditional Template Constructs Supported in Cisco BAC
Conditional statement
Conditional statement
Conditional statement
Conditional expression
Conditional expression
Conditional expression
Conditional expression
Conditional expression
Conditional expression
Conditional expression
Conditional expression
Conditional expression
If
If...else if...else
or
and
lessThan
lessThanEquals
greaterThan
greaterThanEquals
contains, notContains
containsIgnoreCase, notContainsIgnoreCase
equals, notEquals
equalsIgnoreCase, notEqualsIgnoreCase
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-19
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Authoring Configuration Templates
Table 5-2
Conditional Template Constructs Supported in Cisco BAC (continued)
Conditional expression
Conditional expression
when..otherwise
choose
XML does not support the left angle bracket (<) and the ampersand (&). Instead, use the predefined
Table 5-3
XML Definitions in Cisco BAC
Instead of ...
Use ...
< (less than)
<
<= (less than or equal)
> (greater than)
<=
>
>= (greater than or equals)
& (ampersand)
>=
&
'
"
' (apostrophe)
" (double quotes)
The following examples illustrate various conditional expressions:
Example 5-15 Numerical Test Condition
Using 100 as a number:
<tc:if test="VAR(name=/cpe/version, defaultValue=20) greaterThan 100">
<Parameter>
<Name>Enable</Name>
<Value>false</Value>
</Parameter>
</tc:if>
Example 5-16 String Test Condition
Using 100 as string:
<tc:if test="VAR(name=/cpe/version, defaultValue=20) greaterThan '100'">
<Parameter>
<Name>Enable</Name>
<Value>false</Value>
</Parameter>
</tc:if>
Note
When comparing digits as numbers, 20 is less than 100. However, when an operator is used with
a string, comparing digits as strings makes 20 greater than 100.
Example 5-17 Looking for Text in a Cisco BAC Property
Using text cwmp:
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-20
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Authoring Configuration Templates
<tc:if test="contains(VAR(name=/cpe/UsrStr, defaultValue=linksys), 'cwmp')">
<Parameter>
<Name>Enable</Name>
<Value>false</Value>
</Parameter>
</tc:if>
Example 5-18 Looking for Text in Single Quotes
Using cwmp’s test:
<tc:if test="contains(VAR(name=/cpe/UsrStr, defaultValue=linksys), "cwmp's
test")">
<Parameter>
<Name>Enable</Name>
<Value>false</Value>
</Parameter>
</tc:if>
Example 5-19 Looking for Text in Double Quotes
Using cwmp test:
<tc:if test="contains(VAR(name=/cpe/UsrStr, defaultValue=linksys), 'cwmp
"test"')">
<Parameter>
<Name>Enable</Name>
<Value>false</Value>
</Parameter>
</tc:if>
The text blocks that you can enclose within the conditional statements are limited to Parameterand
Object elements.
Example 5-20 Choosing from Alternatives (Using choose and when Syntax)
The following example describes the syntax when using tc:choose and tc:when:
<tc:choose>
<tc:when test="VAR(name=/cpe/version,defaultValue=11) greaterThan 12">
<Parameter>
<Name>UpgradeAvailable</Name>
<Value>true</Value>
</Parameter>
</tc:when>
<tc:when test="VAR(name=/db/version,defaultValue=15) greaterThan 14">
<Parameter>
<Name>UpgradeAvailable</Name>
<Value>true</Value>
</Parameter>
</tc:when>
<tc:otherwise>
<Parameter>
<Name>UpgradeAvailable</Name>
<Value>false</Value>
</Parameter>
</tc:otherwise>
</tc:choose>
Example 5-21 Choosing from Alternatives (Using choose and if Syntax)
The following example describes the syntax when using tc:choose and tc: if:
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-21
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Using the Configuration Utility
<tc:choose>
<tc:if test="contains(VAR(name=FC-ACTIVATED-INFORM-ENABLE, defaultValue=false),
'true')">
<Parameter>
<Name>PeriodicInformInterval</Name>
<Value>21600</Value>
</Parameter>
</tc:if>
<tc:else>
<Parameter>
<Name>PeriodicInformInterval</Name>
<Value>1200</Value>
</Parameter>
</tc:else>
</tc:choose>
Using the Configuration Utility
You can use the configuration utility to test, validate, and view TR-069 template files: configuration and
firmware rules. These activities are critical to successful deployment of instructions for individualized
configuration files. (For more information on templates, see Authoring Configuration Templates,
The configuration utility is available only when the RDU is installed, and it is installed in the
<BPR_HOME>/rdu/bin directory.
All examples in this section assume that the RDU is operating and that these conditions apply:
•
•
•
The BAC application is installed in the default home directory (/opt/CSCObac).
The RDU login name is bacadmin.
The RDU login password is changeme.
Note
Some of the examples provided in this section were truncated whenever the omitted formation is of no
consequence to the example of its outcome. Instances where this occurs are identified by an ellipsis (...)
that precede the example summary.
This section discusses:
•
•
•
•
•
•
•
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-22
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Using the Configuration Utility
Running the Configuration Utility
In subsequent procedures and examples, the phrase running the configuration utility means to enter the
runCfgUtil.sh command from the directory specified. To run the configuration utility, run this command
from the <BPR_HOME>/rdu/bin directory:
runCfgUtil.sh options
The available options include:
•
-cwmp—Specifies the input file is to be processed as a CWMP technology configuration template
file. Use -cwmp with the -a option.
•
-a {sc | gc}—Specifies a required action, which could be either:
–
sc—To specify a syntax check to test if the XML template and dictionary are well-formed. Use
sc with the –l option.
–
gc—To process a configuration template the same way as the Instruction Generation Service
(IGS) would. Use gc with the (–l and –data), or the (-l and -i) options.
•
-l filename—Identifies the input file to be on the local file system. For example, if the name of your
input file is any_file, enter -l any_file.
Note
Do not use -l with the -r option.
•
•
-o filename—Saves the output of template processing in XML format into the specified file. For
example, to save the output in a file called op_file, enter -o op_file This is an optional element.
-i device id—Specifies the device to use for variable substitution when processing the template.
Variable values are retrieved by using the device’s properties. Use with the -r option.
•
•
•
•
-r filename—Specifies name of template stored in the RDU. Use this option instead of the -l option.
-u username—Specifies the username to be used when connecting to the RDU.
-p password—Specifies the password to be used when connecting to the RDU.
-firmware—Specifies the input file to be a firmware rule template. Otherwise, assume configuration
template.
Adding a Template to Cisco BAC
To use the configuration utility to test BAC templates:
Step 1
Step 2
includes other templates, make sure all the referenced templates are in the same directory.
Run the configuration utility on the local file system. You can check the syntax for the template, or have
the configuration utility process template as IGS would, and return XML output.
If the processed template uses VAR()constructs to reference a device property, the resulting output will
contain the defaultValues for those VAR() constructs.
Step 3
Add the template (and any included templates that are used) to the RDU.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-23
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Using the Configuration Utility
If the template uses VAR() constructs to reference a device property, use the device option to generate a
sample template.
Step 4
After all tests succeed, configure a Class of Service to use the template.
Validating XML Syntax for a Local Template File
Use the runCfgUtil.sh command to validate template files stored on the local file system.
Syntax Description
runCfgUtil.sh -cwmp -a sc -l file
•
-cwmp—Identifies the input file to be processed as a CWMP template file.
-a sc—Specifies a syntax check.
•
•
•
-l—Specifies that the input file is on the local file system.
file—Identifies the input template file being validated.
To use a template file that is on the local file system:
Step 1
Step 2
Change directory to /opt/CSCObac/rdu/samples/cwmp.
Select a template file to use.
Note
This example uses an existing template file called sample-cwmp-config.xml. The -cwmp option
is used because this is a CWMP template.Run the configuration utility by using this command:
/opt/CSCObac/rdu/bin/runCfgUtil.sh -cwmp -a sc -l sample-cwmp-config.xml
•
•
•
-cwmp—Identifies the input file as a CWMP template file.
-l—Specifies that the input file is on the local file system.
sample-cwmp-config.xml—Identifies the input template file being validated.
After running the utility, results similar to these should appear:
Broadband Access Center Configuration Utility
Version: 3.0, Revision: 1.26
validating configuration template sample-cwmp-config.xml...
>sample-cwmp-config.xml is valid.
Validating XML Syntax for a Template Stored in Cisco BAC
Use the runCfgUtil.sh command to validate template files that are in the RDU database.
Syntax Description
runCfgUtil.sh -cwmp -a sc -r file -u username -p password
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-24
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Using the Configuration Utility
•
•
•
•
•
-cwmp—Identifies the input file to be processed as a CWMP template file.
-a sc—Specifies a syntax check.
-r file—Identifies the input file as a file that has been added to the RDU.
-u username—Specifies the username to use when connecting to the RDU.
-p password—Specifies the password to use when connecting to the RDU.
To validate a template file that has been added to the RDU:
Step 1
Step 2
Change directory to /opt/CSCObac/rdu/samples/cwmp.
Select a template file to use.
Note
This example uses an existing template file called sample-cwmp-config.xml. The -cwmp option
is used because a CWMP template is being used.
Step 3
Run the configuration utility by using this command:
./runCfgUtil.sh -cwmp -a sc -r sample-cwmp-config.xml -u admin -p changeme
•
•
•
•
sample-cwmp-config.xml—Identifies the input file.
admin—Identifies the username.
changeme—Identifies the password.
-cwmp—Identifies the file as a CWMP template.
After running the utility, results similar to these should appear:
Broadband Access Center Configuration Utility
Version: 3.0, Revision: 1.26
validating configuration template sample-cwmp-config.xml...
>sample-cwmp-config.xml is valid.
Testing Template Processing for a Local Template File
Use the runCfgUtil.sh command to test template processing for a local template file.
Syntax Description
runCfgUtil.sh -cwmp -a gc -l file -o file
•
•
•
•
-cwmp—Identifies the input file to be processed as a CWMP template file.
-a gc—Specifies instructions for configuration generation.
-l file—Specifies that the input file is on the local file system.
-o file—Specifies that the processed template be saved in XML format into the specified file.
To test template processing for a local template file:
Step 1
Step 2
Change directory to /opt/CSCObac/rdu/samples/cwmp.
Select a template file to use. This example uses the existing template file, sample-cwmp-config.xml.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-25
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Using the Configuration Utility
Step 3
Run the configuration utility by using this command:
./opt/CSCObac/rdu/bin/runCfgUtil.sh -cwmp -a gc -l sample-cwmp-config.xml -o output.xml
•
•
sample-cwmp-config.xml—Identifies the input file.
output.xml—Identifies the file in which to save the processed template in XML format.
After running the utility, results similar to these should appear:
Broadband Access Center Configuration Utility
Version: 3.0, Revision: 1.26
generating configuration from sample-cwmp-config.xml...
output.xml generated successfully.
You can view the configuration from the output.xml file.
Testing Template Processing for a Template Stored in Cisco BAC
Use the runCfgUtil.sh command to test the template processing for a template in the RDU database.
Syntax Description
runCfgUtil.sh -cwmp -a gc -r file -o file -u username -p password
•
•
•
•
•
•
-cwmp—Identifies the input file to be processed as a CWMP template file.
-a gc—Specifies instructions for configuration generation.
-r file—Identifies the input file as a file that has been added to the RDU.
-o file—Specifies that the processed template be saved in XML format into the specified file.
-u username—Specifies the username to use when connecting to the RDU.
-p password—Specifies the password to use when connecting to the RDU.
To test the template processing for a template stored in Cisco BAC:
Step 1
Step 2
Step 3
Change directory to /opt/CSCObac/rdu/samples/cwmp.
Select a template file to use. This example uses the existing template file, sample-cwmp-config.xml.
Run the configuration utility by using this command:
./runCfgUtil.sh -cwmp -a sc -r sample-cwmp-config.xml -o output.xml -u admin -p changeme
•
•
sample-cwmp-config.xml—Identifies the input file.
output.xml—Identifies the file in which the generated configuration is to be saved in XML format.
After running the utility, results similar to these should appear:
Broadband Access Center Configuration Utility
Version: 3.0, Revision: 1.26
generating configuration from sample-cwmp-config.xml...
output.xml generated successfully.
You can view the configuration from the output.xml file.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-26
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Using the Configuration Utility
Testing Template Processing for a Cisco BAC Template File and a Device
Use the runCfgUtil.sh command to test the template processing for a file stored in the RDU database
and associated with a device.
Syntax Description
runCfgUtil.sh -cwmp -a gc -r file -o file -i deviceID -u username -p password
•
•
•
•
•
•
•
-cwmp—Identifies the input file to be processed as a CWMP template file.
-a gc—Specifies instructions for configuration generation.
-r file—Identifies the input file as a file that has been added to the RDU.
-o file—Specifies that the processed template be saved in XML format into the specified file.
-i deviceID—Specifies the device to use. Variable values are retrieved using the device properties.
-u username—Specifies the username to use when connecting to the RDU.
-p password—Specifies the password to use when connecting to the RDU.
To test the template processing for a file stored in the RDU and associated with a device:
Step 1
By using the administrator user interface, add the template file
/opt/CSCObac/rdu/samples/cwmp/sample-cwmp-var-config.xml to Cisco BAC.
Note
The sample-cwmp-var-config.xml template has a reference to the
/IPDevice/connectionRequestUsername device property. The API constant for the property is
IPDeviceKeys.CONNECTION_REQUEST_USERNAME.
Step 2
Step 3
Select a template file to use. This example uses the existing template file, sample-cwmp-var-config.xml.
Identify a device that is already in Cisco BAC and use that device’s ID. This example uses a device with
the /IPDevice/connectionRequestUsername property set to testUser.
Step 4
Step 5
Identify the device to use. This example assumes that the device exists in the RDU and has the variables
set as properties.
Run the configuration utility by using this command:
./runCfgUtil.sh -cwmp -a gc -r sample-cwmp-var-config.xml -i OUI-1234 -o output.xml -u
admin -p changeme
•
•
•
•
•
sample-cwmp-var-config.xml—Identifies the input file.
OUI-1234—Identifies the ID of the device. The Device ID used here is for example purposes only.
output.xml—Identifies the file in which to save the processed template in XML format.
bacadmin—Identifies the default username being used in this example.
changeme—Identifies the default password being used in this example
After running the utility, results similar to these should appear:
Broadband Access Center Configuration Utility
Version: 3.0, Revision: 1.26
generating configuration from sample-cwmp-var-config.xml...
output.xml generated successfully.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-27
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5 Configuration Templates Management
Using the Configuration Utility
Note
You can open the output.xml file to view the configuration. The
VAR(name=/IPDevice/connectionRequestUsername, defaultValue=test) statement will be
replaced with testUser.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
5-28
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
6
Firmware Management
This chapter describes firmware management for TR-069 compliant devices in Cisco Broadband Access
Center (Cisco BAC).
This chapter includes the following sections:
•
•
•
•
•
Overview
Firmware management consists of maintaining and distributing sets of firmware image files to
corresponding customer premise equipment (CPE) through the Cisco BAC system. A firmware rules
template associates the firmware image files to groups of devices. Cisco BAC uses the rules in the
associated firmware rules template to evaluate which firmware to download to the device.
The firmware management functionality allows the administrator to view firmware information on
devices, to add firmware images to the database, and to apply the image files to specific devices.
Cisco BAC supports two mechanisms for CPE firmware management:
•
•
Policy-based firmware management through firmware rules templates.
Direct firmware management through device operations API.
information.
In the process of firmware management, regardless of the management method used, the device is
instructed to obtain a new firmware image file from a file server. Cisco BAC provides a file service in
its DPE. However, you can also direct CPE to other file servers.
Firmware rules can apply firmware to devices, based on a match of any preprovisioned or discovered
device parameters, including device group membership, model, type, current state, type of connectivity,
and so on.
The DPE triggers the firmware download by issuing a Download RPC with the location of the file on a
file server and authentication credentials, if any. Cisco BAC supports HTTP and HTTP over SSL, called
SSL/TLS in this chapter, for file downloads on DPE servers.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
6-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 6 Firmware Management
Firmware Management Mechanisms
This download can be initiated in various modes:
•
Firmware-rule based, in which firmware rules may or may not allow the download of the file
requested by a device, or may download a different file. Firmware rules are executed whenever a
device connects to the DPE.
•
The device may contact the DPE, based on periodic contact after a reboot or a specific action, such
as an user-initiated upgrade by clicking in the local user interface of the device. Regardless of how
the device contacts the DPE, the firmware rules, determine whether the upgrade is needed and is
allowed at the time of the particular interaction.
•
Proxy, in which an external application invokes the API download operation for a specific device
and specifies the firmware image file location. The DPE then executes the Download RPC on the
device, causing the device to download the file from the specified location.
The download can occur in three ways:
–
–
–
Immediate, in which the DPE connects to the device and instructs the device to download the
firmware.
On-connect, in which the DPE instructs the device to download the firmware on next contact
with the device.
Asynchronous, in which the DPE instructs the device to download the firmware without
reserving the PACE thread at RDU. The operation result is sent to the API client in an
AyncOperationEvent.
The multiple instance object support is available in the firmware template, which facilitates discovering
the device parameters for multiple object instances. The parameter value associated with the discovered
object instances is matched with the parameter values specified in the template, and further firmware
rule is applied based on the match condition. For more information on multi-instance object support, see
Firmware Management Mechanisms
This section describes CPE firmware-management mechanisms provided by Cisco BAC. These
comprise:
•
•
Policy-based firmware management through firmware rules templates. See Firmware Rule
Templates, page 6-2, for detailed information.
External firmware management through proxy operations. See Direct Firmware Management,
page 6-4, for detailed information.
Firmware Rule Templates
You use rule templates to set policy-based firmware management. The firmware rules templates are
XML documents written according to a published schema document. Each template must be stored in a
file and uploaded into Cisco BAC.
Each firmware rules template contains one or more rules which trigger firmware updates based on
specific conditions. Any number of such templates can be added to Cisco BAC, through the administrator
user interface or API. The template is associated with a Class of Service object using the
COS_CWMP_FIRMWARE_RULES_FILEproperty. Each device, in turn, is assigned to a Class of Service. (For
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
6-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 6 Firmware Management
Firmware Management Mechanisms
In this model, you can make convenient updates to the definition of the rules, which apply to a large
number of devices. When the rules template is updated, CPE that are indirectly associated with the
template through the Class of Service are managed according to the new policy.
When the device establishes a connection with Cisco BAC, its firmware and configuration are
automatically synchronized based on the configuration and firmware rules cached at the DPE. First, the
firmware rules are executed, and if appropriate, the device firmware is updated. Then, the device
configuration is synchronized.
Earlier to this release, the only file type supported by Cisco BAC was "1 Firmware Upgrade Image".
With this release of Cisco BAC, firmware download is enhanced to allow upgrade of CPE devices with
different vendor specific TR-069 download file types. Now vendor can define file type in both internal
and external firmware rule tag.
Cisco BAC provides a two-stage firmware rule processing. First, the templates are processed at the RDU
where template constructs such as conditionals and substitutable parameters are interpreted (See Using
This processing allows customization of rules for devices based on data available at the RDU (such as
device properties and grouping). This data could be preprovisioned by using the API. Data previously
discovered from the device and stored at the RDU can also be used in constructing the templates.
After the template has been processed, the resulting rules are sent to the DPEs in the device’s
provisioning group. The rules, in turn, can have dynamic matching criteria, which enable further
granularity in firmware rules policy.
To determine if a firmware update is needed, the rules engine at the DPE evaluates the firmware rules.
Firmware rules allow a firmware update to be triggered on match of:
•
•
•
•
•
Inform event types
Device RequestDownloadRPC arguments
Inform parameter values
Any other device parameter values
MaintenanceWindow time
Note
You can use the MaintenanceWindow option to schedule firmware downloads to a device.
Together, these rules provide a powerful mechanism to create policy for managing firmware. For
example, an administrator can write a rule that forces all devices of a certain model with a certain current
firmware version to upgrade to a different firmware, during a specific service time window.
The DPE logs an entry for all cases of firmware selection by using rules. It also logs an entry if none of
the rules match. This logging mechanism can be useful to track devices that have no firmware image file
associated with them or if the device firmware is simply up to date.
Cisco BAC uses the XML schemas that are defined in various files to generate instructions for device
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
6-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 6 Firmware Management
Firmware Management Mechanisms
Table 6-1
Files Used in Firmware Rules Template Processing
File
Purpose
Options Available in Cisco BAC
Firmware
Rules
Template
Samples
Defines device configuration
Sample templates are located at:
<BPR_HOME>/rdu/samples/cwmp
Sample templates
Firmware
Rule
Template
Schema
Validates firmware rules template syntax
Default template schemas
Default template schemas are located at:
•
Firmware rules template schema
<BPR_HOME>/rdu/templates/cwmp/schema/FirmwareTemplateSchema.xsd
•
Common template schema
<BPR_HOME>/rdu/templates/cwmp/schema/CommonTemplateConstructs.xsd
Parameter
Dictionary
Validates firmware rules template content
Default dictionaries
Default dictionaries are located at:
•
•
•
•
•
•
•
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr069-cwmp-dictionary.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr098-cwmp-dictionary.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr104-cwmp-dictionary.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr106-cwmp-dictionary.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr196-cwmp-dictionary-v1.1.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr196-cwmp-dictionary-v2.0.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr196-cwmp-dictionary-IGD-v1.1.
xml
•
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr196-cwmp-dictionary-IGD-v2.0.
xml
•
<BPR_HOME>/rdu/templates/cwmp/dictionary/basic-cwmp-dictionary.xml
Parameter
Dictionary
Schema
Validates parameter dictionary syntax
Default dictionary
Parameter dictionary schema is located at:
Schema for TR-069, TR-098, TR-104, TR-106, TR-181, and TR-196 dictionaries
<BPR_HOME>/rdu/templates/cwmp/schema/TemplateDictionarySchema.xsd
Direct Firmware Management
The Cisco BAC device operations API allows the OSS to execute operations on individual devices.
Among other operations, Cisco BAC provides standard CWMP RPC operations.
Managing firmware using device operations API gives the OSS precise control over operations
performed on CPE. The OSS issues specific API calls which correspond to remote procedure calls
(RPCs) necessary for CPE firmware update.
For example, a Download RPC can be invoked on the device using a corresponding API call. This
command contains the URL of the firmware image file that the device should download and, if necessary,
authentication credentials.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
6-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 6 Firmware Management
Managing Firmware Files
File Service
In the process of firmware management and regardless of which management method is used, the device
is instructed to obtain a new firmware file from a file server. Cisco BAC provides a file service in its DPE
servers. However, CPE can also be directed to other file servers if necessary. For the various
Managing Firmware Files
Firmware file management comprises the management of firmware image files and firmware rule
template files. This functionality allows the administrator or applications by using the API to add, delete,
or replace firmware image files and firmware rule template files, and view and search firmware image
files and file information.
You can manage firmware through the administrator user interface, or through the API. To manage
firmware image file and firmware rule templates on the administrator user interface, choose
Configuration > Files.
Firmware rule template files determine the firmware image for a device. These files are stored in the
RDU database with the file type Firmware Rules Template.
Firmware image files are stored in the RDU database with file type Firmware File. Each firmware image
file has a firmware version that is specified by using the Firmware Versionattribute. The DPE uses the
firmware version information to evaluate firmware rules.
Note
While firmware images are managed using the central server (RDU), they are automatically distributed
or deleted from the appropriate DPEs.
Firmware file management allows the following operations for each file type:
Table 6-2
Firmware File Management Operations
Firmware Image File
Firmware Rules Template
Add
Add
You can add a firmware rule template file to the
system only if it is valid; otherwise, Cisco BAC
displays error messages explaining the type of
error in the template.
Delete
Delete
You cannot delete an existing firmware image file You cannot delete a firmware rules template if it is
if it is referenced in a firmware rules template.
referenced by a Class of Service.
To successfully delete a firmware image file,
remove the reference to the firmware file in the
firmware rules template.
To successfully delete a firmware rules template,
remove the reference to the Class of Service.
Retrieve contents
Retrieve contents
-
Retrieve file attributes, such as size, name, and
properties
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
6-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 6 Firmware Management
Authoring Firmware Rules Templates
Table 6-2
Firmware File Management Operations (continued)
Firmware Rules Template
Firmware Image File
Replace contents and/or modify file
attributes/properties
Replace file contents, modify file attributes and
properties, or both
You can replace an existing firmware image file
even if the file is associated to a firmware file
template using the API. The administrator user
interface, however, notifies of existing
associations before replacing a firmware image
file.
When a firmware image file’s contents are
replaced, IGS regenerates firmware rules for each
affected device and IGS distributes them to the
DPEs in the device’s provisioning group.
Subsequently, when the device contacts the DPE,
new rules are executed.
Search by name, suffix, regex or file type
-
-
View templates in tabular form from the
administrator user interface
Templates appear in tabular form only if they do
not include conditionals.
Authoring Firmware Rules Templates
Firmware rule templates in Cisco BAC are based on an XML schema file located at
<BPR_HOME>/rdu/templates/cwmp/schema/FirmwareTemplateSchema.xsd.
Firmware rules execute after processing an Inform from the device. They are also triggered after the
device issues a RequestDownload RPC.
A firmware rules template comprises:
•
FirmwareTemplate—The root element, which can contain a Prerequisites tag, and one or more
named FirmwareRule elements.
Firmware rules are processed in order and, once a firmware rule matches, further rules are not
processed.
–
TemplateVersion—A TemplateVersion attribute has been introduced to support the different
firmware file types and the download of large firmware files. In the FirmwareTemplate
configuration file, the template version must be set to 3.0 to enable multi-instance object
support feature. If the template version is not provided or is set to 1.0, the new features will not
work as expected.
•
Prerequisites—Contains conditions which must be met before the rules listed in the firmware rule
template are processed. Prerequisites may contain zero or one MaintenanceWindow, and zero or
more Expressions.
You can enable Expressions and MaintenanceWindow for firmware templates just as it is done for
configuration templates.
–
MaintenanceWindow—Describes the time range within which the firmware rule template is
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
6-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 6 Firmware Management
Authoring Firmware Rules Templates
–
Expression—Zero or more expression for evaluating this rule; has the same syntax and
definition as the Expression defined for the FirmwareRule element. For detailed information,
•
FirmwareRule—Each FirmwareRule element provides:
–
Expression—Zero or more expressions for evaluating this rule. The rules triggers a firmware
update if all expressions in a given rule match. For detailed information, see Expression and
–
–
InternalFirmwareFile or ExternalFirmwareFile—One of the two must be specified.
InternalFirmwareFile is used if the Cisco BAC file service is utilized, and the firmware image
file has been added to the system using the API or the administrator user interface.
–
ExternalFirmwareFile provides information for firmware image files located on external file
servers.
Expression and Regular Expression
Expressions provide a conditional way to apply the firmware rules based on value match. If the value is
a range, Regular Expression (Regex) is used for defining the firware rule in firmware rule template.
Regular expression provides a conditional way to apply the firmware rules based on Regex pattern
match. Each expression or Regex must provide a ParameterName, InformParameterName or
RpcArgumentName tag, one or more Value tags and an Operator tag.
The value of the event returned from the CPE, and the condition specified for the event determines
whether the firmware rule is applied to the CPE. The firmware rules are defined in the firmware template
with the appropriate event, Regex pattern associated with the event, and the condition for applying the
firmware rule.
Regex support is also available in the configuration templates prerequisites. For more information on
Cisco BAC processes these tags in sequence to match and assign a firmware image file to the CPE.
ParameterName
Specifies the name of a TR-069 parameter. The ParameterName is validated by using the relevant
parameter dictionary.
The DPE may have this parameter available from Inform or from prior GetParameterValues RPCs calls
within the same session. If the parameter value is not available in the session when processing the rule,
the DPE queries the device for the missing parameter values before proceeding with evaluation of the
rules.
InformParameterName
Specifies the name of an Inform parameter that is not described in the parameter dictionary. This entry
is not validated.
For example, the expression in the following example evaluates to true if the device Inform.EventCode
includes either of the specified values:
<Expression>
<InformParameter>Inform.EventCode</InformParameter>
<Value>1 BOOT</Value>
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
6-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 6 Firmware Management
Authoring Firmware Rules Templates
<Value>3 SCHEDULED</Value>
<Operator>match</Operator>
</Expression>
Cisco BAC supports the following parameter names in the InformParameter tag:
•
•
•
•
•
Inform.DeviceId.Manufacturer
Inform.DeviceId.ManufacturerOUI
Inform.DeviceId.ProductClass
Inform.DeviceId.SerialNumber
Inform.EventCode
For information on the values for Inform.EventCode, refer to the DSL Forum’s Technical Report on
TR-069.
Value
Specifies data for the Parameter. One or more possible values might be listed for a given parameter. The
data type for a value is validated by using a dictionary when possible.
In the expression, if you need to set a value that contains comma, then specify each item of the value
separated by a comma in separate value tag. For example, the comma-separated value 12.4(22)T,
RELEASE SOFTWARE (fc1) can be set as in the following expression:
<Expression>
<ParameterName>InternetGatewayDevice.DeviceInfo.SoftwareVersion</ParameterName>
<Value>12.4(22)T</Value>
<Value>RELEASE SOFTWARE (fc1)</Value>
<Operator>match</Operator>
</Expression>
You can also set the value as empty.
RpcArgumentName
Specifies the name for a parameter that the device reports. The possible values are
RequestDownload.FileType and RequestDownload.FileTypeArg\*
•
•
RequestDownload.FileType indicates the type of file that the device is requesting to download.
RequestDownload.FileTypeArg\* indicates any argument that the device might have provided in a
download request message. The asterisk (*) denotes the actual argument name.
Operator
Evaluates the Parameter and the Value. In evaluating the expression, the Operator may be one of the
following:
•
•
•
•
match—Specifies that the device parameter value must match at least one of the values in a
case-sensitive comparison.
matchIgnoreCase—Specifies that the device parameter value must match at least one of the values
in a case-insensitive comparison.
matchAll—Specifies that the device parameter value must match all of the values in a case-sensitive
comparison.
matchAllIgnoreCase—Specifies that the device parameter value must match all of the values in a
case-insensitive comparison.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
6-8
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 6 Firmware Management
Authoring Firmware Rules Templates
•
•
noMatch—Specifies that the device parameter value must not match any of the values in a
case-sensitive comparison.
noMatchIgnoreCase—Specifies that the device parameter value must not match any of the values in
a case-insensitive comparison.
Example 6-1 Expression - match InformParameterName
In the following sample expression, the match condition indicates that the subsequent rules are valid
when the InformParameter Inform.EventCodehas exactly the value 1 BOOT. The device reports this
value in the Inform message when it contacts the autoconfiguration server (ACS).
<Expression>
<InformParameterName>Inform.EventCode</InformParameterName>
<Value>1 BOOT</Value>
<Operator>match</Operator>
</Expression>
Example 6-2 Expression - match RpcArgumentName (RequestDownload.FileType)
In the following sample expression, the match condition indicates that the subsequent rules should be in
effect when the RPCArgumentName RequestDownload.FileTypematches exactly the value 1 Firmware
Upgrade Image.
<Expression>
<RpcArgumentName>RequestDownload.FileType</RpcArgumentName>
<Value>1 Firmware Upgrade Image</Value>
<Operator>match</Operator>
</Expression>
Example 6-3 Expression - match RpcArgumentName (RequestDownload.FileTypeArg)
In the following sample expression, the match condition indicates that the subsequent rules should be in
effect when the RPCArgumentName RequestDownload.FileTypeArg.Versionmatches the value 1.1.
Note
The CWMP specification defines Version to be a FileTypeArg that you can use if File Type is
Web Content.
<Expression>
<RpcArgumentName>RequestDownload.FileType</RpcArgumentName>
<Value>2 Web Content</Value>
<Operator>match</Operator>
</Expression>
<Expression>
<RpcArgumentName>RequestDownload.FileTypeArg.Version</RpcArgumentName>
<Value>1.1</Value>
<Operator>match</Operator>
</Expression>
Example 6-4 Expression - noMatch ParameterName
In the following sample expression, the match condition indicates that the subsequent rules should be in
effect when the Parameter InternetGatewayDevice.DeviceInfo.SoftwareVersiondoes not match the
software version 1.02.
<Expression>
<ParameterName>InternetGatewayDevice.DeviceInfo.SoftwareVersion</ParameterName>
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
6-9
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 6 Firmware Management
Authoring Firmware Rules Templates
<Value>1.02</Value>
<Operator>noMatch</Operator>
</Expression>
While specifying the Regex pattern, the operator tag may be one of the following:
•
regexMatch—Indicates a condition that is set to ensure that the firmware rule is applied only when
the device parameter value matches the Regex pattern.
•
regexNoMatch—Indicates a condition that is set to ensure that the firmware rule is applied only
when the device parameter value does not match the Regex pattern.
Example 6-5 Expression - regexMatch
In the following sample expression, the regexMatch condition indicates that the firmware rule comes into
effect when the Parameter Inform.EventCodematches Regex pattern ^[0-9]\s\w.
<Expression>
<InformParameterName>Inform.EventCode</InformParameterName>
<Value>^[0-9]\s\w</Value>
<Operator>regexMatch</Operator>
</Expression>
If the condition is specified as regexNoMatch, the firmware rule is applied only when the
Inform.EventCodedoes not match the Regex pattern ^[0-9]\s\w specified in the value tag.
Note
Under expression, if the operator is regexMatch or regexNoMatch, ensure that only one value tag is used.
Internal Firmware File vs. External Firmware File
The Internal and External firmware image file elements define whether the firmware image files are
located within the Cisco BAC file server or at remote file server.
InternalFirmwareFile
The InternalFirmwareFile element describes the filename of the firmware image that was added to the
RDU and automatically distributed to DPEs and the delivery transport method employed to download
the firmware image to a device. It comprises:
•
•
FileName—Specifies the name of the file in the RDU database.
DeliveryTransport—Specifies service HTTP 1 or service HTTP 2 transfer.
You should configure the corresponding file service (HTTP 1 or HTTP 2) on the DPE. For
If you define multiple services on the DPE with the same transport, for example, two HTTP, the DPE
chooses the first one to service the device.
•
•
FileType—Specifies the vendor specific download FileType element. This element is optional. The
default value is 1 Firmware Upgrade Image. The template version must be set to 2.0 to enable this
feature.
Location—Specifies the location where the files are stored. Possible values are Cache and File
System. The default value is Cache. Specifying the location is optional and to enable this, you must
set the template version to 2.0.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
6-10
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 6 Firmware Management
Authoring Firmware Rules Templates
•
FileSize—Specifies the size of the file. This is mandatory when the location is File System. The
FileSize can also be set to 0.
Examples
<InternalFirmwareFile>
<FileName>sample-firmware-image1.bin</FileName>
<DeliveryTransport>service http 1</DeliveryTransport>
<FileType>X CISCO_COM DLCImage</FileType>
<Location>File System</Location>
<FileSize>1234</FileSize>
</InternalFirmwareFile>
ExternalFirmwareFile
The ExternalFirmwareFile element describes the name of a firmware image file located at a remote
server. It comprises:
•
•
FileURL—Specifies the URL for a firmware image file located at remote location.
FileSize—Specifies the size of the firmware image file to be downloaded. The FileSize can also be
set to 0.
•
•
AuthenticationCredentials—Specifies the username and password to use if HTTP authentication is
enforced by the file server. The username and password are transmitted using the Download RPC to
the device.
FileType—Specifies the vendor specific download FileType element. This element is optional. The
default value is 1 Firmware Upgrade Image. The template version must be set to 2.0 to enable this
feature.
Note
Ensure that you use SSL/TLS for CWMP to avoid transferring passwords in clear text.
You can use substitutable parameters to make the template-processing engine derive a
device-specific username and password from the device record when processing firmware
rules at the RDU.
Examples
<ExternalFirmwareFile>
<FileURL>http://imageserver.isp.com/sample-firmware-image.bin</FileURL>
<FileSize>3449</FileSize>
<AuthenticationCredentials>
<HttpUserName>test</HttpUserName>
<HttpPassword>changeme</HttpPassword>
</AuthenticationCredentials>
<FileType>X CISCO_COM DLCImage</FileType>
</ExternalFirmwareFile>
Sample Firmware Rules Template
The following is an example of a firmware template that supports the new feature like multi-instance
object support and features supported in earlier versions of firmware template.
<FirmwateTemplate templateVersion="3.0">
<Prerequisites>
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
6-11
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 6 Firmware Management
Authoring Firmware Rules Templates
<MaintenanceWindow>
<StartTime>01:00:00</StartTime>
<Duration>5:00</Duration>
</MaintenanceWindow>
<Expression>
<InformParameterName>Device.DeviceInfo.EventCode</InformParameterName>
<Value>1 BOOT</Value>
<Operator>match</Operator>
</Expression>
<Expression>
<ParameterName>Device.DeviceInfo.HardwareVersion</ParameterName>
<Value>W3GFP-100-Rev 6.0</Value>
<Operator>matchIgnoreCase</Operator>
</Expression>
<Expression>
<ParameterName>Device.Services.FAPService.{i}.REM.UMTS.GSM.Cell.{i}.BSIC</ParameterName>
<InstanceConfiguration>
<Instance>
<Path>Device.Services.FAPService.</Path>
<Value>last()</Value>
</Instance>
<Instance>
<Path>Device.Services.FAPService.{i}.REM.UMTS.GSM.Cell.</Path>
<Value>compare(LAC lessThanEquals 65534)</Value>
</Instance>
<MatchCondition>OR</MatchCondition>
</InstanceConfiguration>
<Value>18</Value>
<Operator>matchAllIgnoreCase</Operator>
</Expression>
</Prerequisites>
<FirmwareRule name="InternalFileRule">
<Expression>
<InformParameterName>Device.DeviceInfo.SoftwareVersion</InformPaameterNam>
<Value>5.4.0</Value>
<Operator>match</Operator>
</Expression>
<Expression>
<ParameterName>Device.Services.FAPService.{i}.REM.UMTS.GSM.Cell.{i}.BSIC</ParameterName>
<InstanceConfiguration>
<Instance>
<Path>Device.Services.FAPService.</Path>
<Value>compare(DeviceType equalsIgnoreCase fap)</Value>
</Instance>
<Instance>
<Path>Device.Services.FAPService.{i}.REM.UMTS.GSM.Cell.</Path>
<Value>1</Value>
</Instance>
<MatchCondition>OR</MatchCondition>
</InstanceConfiguration>
<Value>18</Value>
<Operator>matchAllIgnoreCase</Operator>
</Expression>
<InternalFirmwareFile>
<FileName>sample-firmware-image.bin</FileName>
<DeliveryTransport>HTTP</DeliveryTransport>
<Location>File System</Location>
<FileSize>1234</FileSize>
<FileType>X CISCO_COM DLCImage</FileType>
</InternalFirmwareFile>
</FirmwareRule>
<FirmwareRule name="ExternalFirmwareRule">
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
6-12
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 6 Firmware Management
Using Template Constructs with Firmware Rule Templates
<Expression>
<InformParameterName>Device.DeviceInfo.SoftwareVersion</InformParameterName>
<Value>5.4.1</Value>
<Operator>match</Operator>
</Expression>
<ExternalFirmwareFile>
<FileURL>http://10.10.10.10:889/sample-firmware-image.bin</FileURL>
<FileSize>3449</FileSize>
<AuthenticationCredentials>
<HttpUserName>test</HttpUserName>
<HttpPassword>changeme</HttpPassword>
</AuthenticationCredentials>
<FileType>X CISCO_COM DLCImage</FileType>
</ExternalFirmwareFile>
</FirmwareRule>
</FirmwareTemplate>
Using Template Constructs with Firmware Rule Templates
You can use the Cisco BAC template-processing mechanism to generate customized configurations for
a large numbers of CPE by using a small number of templates. The use of template constructs enables
this mechanism.
Template constructs are any of the tc:include, tc:if, and tc:choose conditional statements, which are
used in conjunction with Cisco BAC properties. The template processor processes the constructs when
generating instructions for a device. The instructions are then forwarded to the DPE and cached there.
FirmwareRules, on the other hand, are tags within a firmware rule template and describe the firmware
image to send to the device. Firmware rules may include expressions that are evaluated when the device
contacts Cisco BAC to retrieve configuration. If the expressions evaluate to true, the device is instructed
to download a specific firmware image file.
Firmware rules can apply firmware to devices based on a match of any preprovisioned or discovered
device parameters, including device group membership, model, type, current state, type of connectivity,
and so on. This processing is done at the RDU, with the preprovisioned or discovered data available at
the central server.
This release supports the following general classes of template constructs:
•
Parameter substitutions—Rule content can be inserted based on parameter values stored on device
records or other objects within the Cisco BAC data model.
Includes—One template may include another.
•
•
Conditional expressions—Rule content can be inserted based on evaluation of conditional
statements.
You use XML tags with the prefix tc to specify these template constructs.
Note
Elements prefixed by tc are generic constructs that are the same for firmware rule templates
and configuration templates.
Cisco BAC firmware rules constructs are based on the XML schema defined in the file located at:
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
6-13
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 6 Firmware Management
Using Template Constructs with Firmware Rule Templates
•
•
<BPR_HOME>/rdu/templates/cwmp/schema/FirmwareTemplateSchema.xsd
<BPR_HOME>/rdu/templates/cwmp/schema/CommonTemplateConstructs.xsd
Note
The XML namespace of the Cisco BAC Common Template constructs is defined as
xmlns:tc='urn:com:cisco:bac:common-template'.
Using Parameter Substitution
Values from the Cisco BAC property hierarchy are substituted into a template by using the VAR()
construct, in order to produce firmware rules specific to a given device. The VAR()construct can appear
in an XML element value or element attribute. It can also be used to substitute full or partial values.
The following list describes the constructs that Cisco BAC supports for parameter substitution:
•
•
•
•
•
Cisco BAC property value into XML element content
Cisco BAC property value into XML element attribute
Default value
XML partial element content
Values with special characters
Using Includes
You use Include files to build a set of reusable template snippets. These files are useful for defining
options that are common across many classes, without having to duplicate the options in several
templates.
You can include the content of a particular file to a template by using the tc:include construct. After
inserting the content of included files into the host template, the Parameter Dictionary specified in the
host template, validates the content of the resulting template.
Note
Note
If included templates use objects and parameters that are not defined in the same dictionary as the host
template, parameter validation fails during instruction generation.
The tc:Include element specifies the href attribute, where href identifies the name of the Cisco BAC
template file that is included in the host template. Use double quotation marks (") when using an Include
directive in a template.
When one template is included in another, the parameter dictionary and prerequisite tags from the
included template are ignored. The schema of the firmware template enforces the location of an Include
tag within a firmware template.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
6-14
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 6 Firmware Management
Using Template Constructs with Firmware Rule Templates
Using Conditionals
Cisco BAC supports powerful conditional expressions in template constructs to enable ultimate
configuration customization. You can use these conditional expression constructs to include or exclude
blocks of text within a template. These construct elements are tc:if, tc:choose, and tc:when. For detailed
By using conditionals, you can also enable devices to bypass firmware upgrade. If a device does not
match the required conditions specified in the firmware rules template, then the device bypasses an
Example 6-6 Firmware Upgrade Bypass
The following is an example of a firmware rule template that describes a firmware upgrade bypass using
the if construct.
If checkVersionis set to true, the rules check the software version on the device; if the version does not
match, firmware upgrade is bypassed. If checkVersionis set to false, the rules do not check for the
software version and the device gets instructions on firmware download.
<tc:Template xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:tc="urn:com:cisco:bac:common-template" xmlns="urn:com:cisco:bac:firmware-template"
xsi:schemaLocation="urn:com:cisco:bac:common-template CommonTemplateConstructs.xsd">
<FirmwareTemplate>
<ParameterDictionaries>
<ParameterDictionary>tr069-cwmp-dictionary.xml</ParameterDictionary>
</ParameterDictionaries>
<!-- Upgrade rule: if software version is 0.00.22, direct the device to download
sample-firmware-image.bin -->
<!-- devices that do not have software version 0.00.22 , will bypass firmware
upgrade. -->
<FirmwareRule name="LinksysWAG54G2Rule">
<tc:if test="equals(VAR(name=/cpe/checkVersion,defaultValue=false), true)">
<Expression>
<ParameterName>InternetGatewayDevice.DeviceInfo.SoftwareVersion</ParameterName>
<Value>0.00.22</Value>
<Operator>matchIgnoreCase</Operator>
</Expression>
</tc:if>
<InternalFirmwareFile>
<FileName>sample-firmware-image.bin</FileName>
<DeliveryTransport>service http 1</DeliveryTransport>
</InternalFirmwareFile>
</FirmwareRule
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
6-15
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 6 Firmware Management
Using Template Constructs with Firmware Rule Templates
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
6-16
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
7
Parameter Dictionaries
This chapter describes Parameter Dictionaries which are used in the process of configuring and
managing customer premises equipment (CPE) for CWMP.
This chapter includes the following sections:
•
•
•
•
•
Overview
Parameter dictionaries are XML files that list valid objects and parameters that Cisco BAC uses to
configure a CWMP device. The dictionaries validate the objects and parameters used in the configuration
and firmware rule templates.
Parameter dictionaries provide metadata about the supported objects and parameters, such as name, type,
writeability and readability. Each dictionary is stored in a file and added to the RDU through the
management API or the administrator user interface.
Configuration and firmware rule templates include a ParameterDictionary tag, an indicator of which
dictionary defines the parameters in a given template. Cisco BAC validates configuration and firmware
rule templates by using the dictionary to which the templates refer. All parameter names and values in
the configuration and firmware rule template must be compatible with the parameters referenced in the
parameter dictionary.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
7-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 7 Parameter Dictionaries
Using Default Dictionaries
Figure 7-1 illustrates the schema of a parameter dictionary.
Figure 7-1 Parameter Dictionary Schema
attributes
name
ParameterDictionary
object
1..
object
Name
Type
Parameter
Readable
Writable
0..
SupportsNotification
writable
Configuration or firmware rules template processing fails during instruction generation if there are errors
in the template. To avoid configuration instruction generation errors, ensure that all:
•
•
The object names and parameter names exist in the dictionary.
The parameter values specified in templates directly or through substitutable parameters are of the
type specified in the dictionary.
•
Parameters that are not writable do not have a value. However, they may have the notification, access
control, or both attributes set in configuration templates.
Using Default Dictionaries
This Cisco BAC release provides default dictionaries according to the parameters defined in the TR-069,
the TR-098, TR-104, TR-181, and the TR-196 specifications. Each of the specifications cover the
following data models:
•
•
•
•
•
TR-069—Internet Gateway Device data model 1.0.
TR-098—Internet Gateway Device data model 1.1, including extensive QoS capabilities.
TR-104—VoIP data model for gateway or standalone ATA.
TR-181—Device data model for TR-069 issue 2 amendment 2.
TR-196—Femto Access Point Service data model amendment 1 and issue 2.
For administrative convenience, the basic-cwmp-dictionary.xml dictionary provides a combination of all
standard parameters (TR-098 and TR-104).
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
7-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 7 Parameter Dictionaries
Custom Dictionaries
These default dictionaries are located at:
•
•
•
•
•
•
•
•
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr069-cwmp-dictionary.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr104-cwmp-dictionary.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr098-cwmp-dictionary.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr196-cwmp-dictionary-v1.1.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr196-cwmp-dictionary-v2.0.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr196-cwmp-dictionary-IGD-v1.1.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/tr196-cwmp-dictionary-IGD-v2.0.xml
<BPR_HOME>/rdu/templates/cwmp/dictionary/basic-cwmp-dictionary.xml
Note
You cannot modify or delete the default dictionaries in Cisco BAC.
You can add new user-defined dictionaries that templates reference. This feature enables Cisco BAC
support for CPE parameter models, including vendor-specific parameters. For additional information,
see the subsequent section on Custom Dictionaries. Cisco BAC support for vendor-specific dictionaries
enables its use with any emerging data models such as WT-135 (IPTV STB) or WT-140 (NAS).
Custom Dictionaries
CWMP includes an extensibility mechanism that allows the use of vendor-specific parameters in
addition to the standard parameters. Thus, you can add custom dictionaries to the Cisco BAC system to
support any CPE. You can use this feature to support devices with practically any data model, including
emerging standard data models such as WT-135 (IPTV STB) or WT-140 (NAS).
You can add, view, replace, or delete custom dictionaries to or from Cisco BAC through the administrator
user interface or the management API.
Note
You cannot use custom dictionaries for configuration templates. Cisco BAC configuration templates can
only use the parameter dictionaries in the Cisco BAC database.
While adding custom dictionaries, ensure that they are based on the parameter dictionary schema,
described in earlier sections.
Parameter Dictionary Syntax
Cisco BAC validates the syntax of a parameter dictionary according to the Parameter Dictionary Schema,
located at <BPR_HOME>/rdu/templates/cwmp/TemplateDictionarySchema.xsd.
If you want to add a vendor-specific parameter to a standard object, remember to define all higher-level
standard objects and their parameters in the custom dictionary.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
7-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 7 Parameter Dictionaries
Parameter Dictionary Syntax
Cisco BAC supports all data types that are defined in the TR-069 and TR-196 specification. The
Parameter Dictionary specifies the data types that this Cisco BAC release supports, as listed in Table 7-1:
Table 7-1
Cisco BAC Supported Data Types
Type
Description
String
A maximum allowed length may be listed using the string (N) syntax, where
(N) is the maximum string length in characters.
You can also give a value range by using the string[Min:Max] syntax, where
the Min and the Max values are inclusive. If Min or Max are missing, this
indicates no limit.
int
An integer in the range of -2147483648 to +2147483647, inclusive.
You can give a value range by using the int[Min:Max]syntax, where the Min
and the Max values are inclusive. If Min or Max are missing, this indicates no
limit.
unsignedInt
An unsigned integer in the range 0 to 4294967295, inclusive.
You can give a value range using the unsignedInt[Min:Max]syntax, where the
the Min and the Max values are inclusive. If Min or Max are missing, this
indicates no limit.
boolean
A value, where 1 represents true, and 0 represents false.
dateTime
The time expressed in UTC (Universal Coordinated Time) unless stated
otherwise; for example, 2004-01-03T03:04:05-(or +)05:00
base64
You can use the base 64(N) syntax to specify a maximum allowed length, where
(N) is the maximum length in characters after Base64 encoding.
hexBinary
You can use the hexBinary (N) syntax to specify a maximum allowed length,
where (N) is the maximum length in characters after hex encoding.
You can also give a value range by using the int[Min:Max]syntax, where the
Min and the Max values are inclusive. If Min or Max are missing, this indicates
no limit.
Sample Parameter Dictionary
The following is a sample from the TR-069 parameter list, with its corresponding dictionary schema:
Name
Type
Write
Read
R
InternetGatewayDevice
InternetGatewayDevice.DeviceInfo
X_HGI_ALG
Object
-
-
-
-
-
-
Object
R
Object
R
X_08017_ChipModel
ALGNumberOfEntries
Manufacturer
string
R
unsignedInt
string(64)
R
R
<ParameterDictionary xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:noNamespaceSchemaLocation="TemplateDictionarySchema.xsd">
<Object name="InternetGatewayDevice">
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
7-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 7 Parameter Dictionaries
Managing Parameter Dictionaries through User Interface
<Object name="DeviceInfo">
<Writable>false</Writable>
<Parameter>
<Name>Manufacturer</Name>
<Type>string(64)</Type>
<Readable>true</Readable>
<Writable>false</Writable>
</Parameter>
<Parameter>
<Name>X_08017_ChipModel</Name>
<Type>string</Type>
<Readable>true</Readable>
<Writable>false</Writable>
</Parameter>
</Object>
<!-- custom property: InternetGatewayDevice.X_HGI_ALG -->
<!-- as defined for HGI's Application Layer Gateway Management -->
<Object name="X_HGI_ALG">
<Parameter>
<Name>ALGNumberOfEntries</Name>
<Type>unsignedint</Type>
<Readable>true</Readable>
<Writable>false</Writable>
</Parameter>
</Object>
</Object>
</ParameterDictionary>
Managing Parameter Dictionaries through User Interface
You can use the administrator user interface to manage parameter dictionary files, and view, add, delete,
Note
You cannot modify or delete the default dictionaries.
Adding Parameter Dictionaries
To add a new parameter dictionary to the Cisco BAC RDU database:
Step 1
Step 2
Step 3
Choose Configuration on the Primary Navigation bar.
Choose Files on the Secondary Navigation bar. The View Files page appears.
Click Add.
The Add Files page appears.
Step 4
Step 5
Step 6
Step 7
Choose Parameter Dictionary from the File Type drop-down list.
Browse for the Source File Name.
Enter the File Name.
Click Submit.
The View Files page appears with the new file.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
7-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 7 Parameter Dictionaries
Managing Parameter Dictionaries through User Interface
Viewing Parameter Dictionaries
To view the content of a file in the Cisco BAC RDU database:
Step 1
Step 2
Choose Configuration on the Primary Navigation bar.
Choose Files on the Secondary Navigation bar.
The View Files page appears.
Step 3
Step 4
From the File Type drop-down list, select Parameter Dictionary.
Click the View Details icon ( ) corresponding to the file that you had specified for a search.
The content of the Parameter Dictionary appears.
Deleting Parameter Dictionaries
To delete an existing parameter dictionary from the RDU database:
Note
You cannot delete built-in default dictionaries.
Step 1
Step 2
Step 3
Step 4
Choose Configuration > Files.
From the File Type drop-down list, select Parameter Dictionary.
Check the file you want to delete.
Click Delete.
The View Files page appears without the deleted file.
Replacing Parameter Dictionaries
To replace the content of an existing parameter dictionary file in the Cisco BAC RDU database:
Note
You cannot modify built-in default dictionaries.
Step 1
Step 2
Step 3
Choose Configuration > Files.
From the File Type drop-down list, select Parameter Dictionary.
From the search results, click the link corresponding to the file you want to replace.
The Replace File page appears. Note that the selected filename already appears on this page.
Browse for the source file to be used as a replacement for the displayed file.
Step 4
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
7-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 7 Parameter Dictionaries
Managing Parameter Dictionaries through User Interface
Step 5
Step 6
Click Submit.
After submitting the replacement file, a confirmation page appears to indicate that, after replacement,
Cisco BAC will regenerate instructions for the affected devices.
Click OK.
The View Files page appears.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
7-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 7 Parameter Dictionaries
Managing Parameter Dictionaries through User Interface
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
7-8
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
8
CPE History and Troubleshooting
This chapter describes how to troubleshoot the device using device information.
This chapter includes the following sections:
•
•
•
Device History
This section describes the Device History feature, which provides a detailed history of significant events
that occur in a device-provisioning lifecycle. This feature can be helpful for troubleshooting.
You can view device history through the API or through the administrator user interface.
•
•
To retrieve the history of a specific device, invoke the following API:
com.cisco.provisioning.cpe.api.ipdevice.history getHistory (DeviceID deviceID)
To retrieve the history of a specific device using the administrator user interface, see Viewing Device
Table 8-1 details the specific record types supported by the Cisco BAC Device History feature:
Table 8-1
Supported Device History Records
Record Type
Description
Message Format
AddedAutomatically
Recorded when a previously
unregistered device is automatically
added to Cisco BAC after contacting the
DPE.
time: Device record was
automatically created.
Example:
Tue Jul 11 18:41:42 EDT 2006:
Device record was automatically created.
AddedViaAPI
Recorded when a device is added to
Cisco BAC by using the client API.
time: Device record was added
via API by user username.
Example:
Tue Jul 11 18:41:42 EDT 2006:
Device record was added via API by user "admin".
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
8-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 8 CPE History and Troubleshooting
Device History
Table 8-1
Supported Device History Records (continued)
Record Type
Description
Message Format
UpdatedViaAPI
Recorded when a device record stored at time: Device record was updated
the RDU was modified using the client reason by user username.
API.
Example:
Tue Jul 11 18:41:42 EDT 2006:
Device record was updated via API command
"IPDevice.changeClassOfService" by user "admin".
FirstContact
Recorded when a device first contacts
Cisco BAC.
time: Device made first contact
with Cisco BAC.
Example:
Tue Jul 11 18:41:42 EDT 2006:
Device made first contact with Cisco BAC.
CPEDiscoveredData
Updated
Recorded when a device reports new
values for a device parameter, which are parameter values discovered from
tracked by the RDU as discovered data. device.
time: Recorded updates of number
For details on discovered parameters,
Example:
Tue Jul 11 18:41:42 EDT 2006:
Recorded updates of 2 parameter values discovered from device.
ConfigGenRequested
Recorded when device instruction
regeneration is initiated for a device.
time: Device policy instructions
regeneration initiated as a result of
The resulting instructions are sent to all reason by user username.
DPEs in the device's provisioning group.
Example:
Tue Jul 11 18:41:42 EDT 2006:
Device policy instructions regeneration initiated as a result of
execution of API Command "IPDevice.performOperation" by user
"admin".
ConfigUpdated
Recorded when Cisco BAC activates a
new configuration on a device.
time: Device was configured
according to configuration
version: configuration revision.
Example:
Tue Jul 11 18:41:42 EDT 2006:
Device was configured according to configuration version:
215438bb.
UpdatedConfig
Available
Recorded when new configuration
instructions for the device have been
sent from the RDU to the DPEs.
time: Configuration policy for
device was updated; new version:
configuration revision.
Example:
Tue Jul 11 18:41:42 EDT 2006:
Configuration policy for device was updated; new version:
215438bb.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
8-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 8 CPE History and Troubleshooting
Device History
Table 8-1
Supported Device History Records (continued)
Record Type
Description
Message Format
ReportedNewConfig
Recorded when a device reports using a time: Device reported new
new configuration using the
ParameterKey contained in the Inform
message.
configuration version:
configuration revision.
Example:
Tue Jul 11 18:41:42 EDT 2006:
Device reported new configuration version: 215438bb.
NewOperationQueued Recorded when a new device operation time: On-connect operation
is initiated through the client API or the operation name with ID operation
administrator user interface and is
queued by Cisco BAC for execution on a
device.
ID was queued by user username.
Example:
Tue Jul 11 18:41:42 EDT 2006:
On-connect operation "SetParamValues" with ID
"15e2ccd:10c5f4b2ad0:80000024" was queued by user "admin".
OperationExecuted
Recorded when an operation initiated
through the client API or the
administrator user interface is
successfully executed on a device.
time: Operation mode operation
name with ID operation id was
executed on the device.
Example:
Tue Jul 11 18:41:42 EDT 2006:
On-connect operation "SetParamValues" with ID
"15e2ccd:10c5f4b2ad0:80000024" was executed on the device.
OperationRemoved
Recorded when a device operation
queued within Cisco BAC is removed.
time: On-connect operation
operation name with ID operation
id was removed.
Example:
Tue Jul 11 18:41:42 EDT 2006:
On-connect operation "GetParamValues" with ID
"15e2ccd:10c5f4b2ad0:80000025" was removed.
ReportedNewFirmware Recorded when a device reports by using time: Device reported new
new firmware using the Inform message. firmware/software version:
firmware/software version.
Example:
Tue Jul 11 18:41:42 EDT 2006:
Device reported new firmware/software version: 6d9bfec2.
UpdatedFirmwareRules Recorded when new firmware rules for time: Firmware rules for device
Available
the device have been sent from the RDU were updated; new version:
to the DPEs.
firmware rules revision.
Example:
Tue Jul 11 18:41:42 EDT 2006:
Firmware rules for device were updated; new version: 6d9bfec2.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
8-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 8 CPE History and Troubleshooting
Device History
Configuring Device History
You use the Device History feature to record significant events in a device-provisioning lifecycle. This
section describes how to enable or disable this feature.
Enabling Device History
Device History is, by default, enabled. To enable or disable this feature from the API, change the
SERVER_DEVICE_HISTORY_ENABLE_KEYproperty.
Note
Every time Device History is enabled or disabled, a message is logged in audit.log. Device history is
also stored in the troubleshooting log.
To enable or disable Device History through the administrator user interface:
Step 1
Step 2
Choose Configuration on the Primary Navigation bar or Main Menu page.
Choose Defaults on the Secondary Navigation bar.
The Configure Defaults page appears.
Step 3
Step 4
Click System Defaults.
On the defaults page, against Device History, click the Enabled radio button.
Note
To disable the device history feature, click the Disabled radio button. When Device History is
disabled, no new updates to any existing device or details of any new device are recorded in the
device history. However, existing events are retained.
Step 5
Click Submit, or click Reset to return to default values.
Viewing Device History
To view the device history from the administrator user interface:
Step 1
Step 2
From the Devices page, locate the device whose history you want to view. You can use one of the search
types for this purpose.
Click the View Details icon ( ) corresponding to the correct device.
The Device Details page appears.
Step 3
Against View Device History Details, click the View Details icon.
The Device History Details page appears.
You can retrieve device history by using the API command IPDevice.getDeviceHistory().
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
8-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 8 CPE History and Troubleshooting
Device History
Configuring Device History Size
To configure the maximum number of device history entries from the administrator user interface,
choose Configuration > Defaults > System Defaults. Enter a value in the field corresponding to
Maximum Device History Entries. The default number of entries is 40.
To configure this number from the API, set the SERVER_MAX_DEVICE_HISTORY_SIZEproperty.
If you reduce the value of the Maximum Device History Entries, the existing records which exceed the
limit do not get purged until a new device history is recorded. At that point, the device's history is
updated according to the limit on maximum device history entries that the administrator sets.
If the maximum number has been increased, the older entries are retained. If the maximum number has
been decreased, the oldest entries are deleted.
Device History Records
The device history records are logged in a rolling list. When the list reaches the limit that the
administrator specifies, the oldest entry is removed. However, the following records are never deleted:
•
•
•
AddedViaAPI (in the case of preregistered devices)
AddedAutomatically (in the case of unregistered devices)
FirstContact
To optimize Cisco BAC performance that extensive recording of device activity might impact, you can
enable or disable specific event types with the following system properties from the API:
Note
These properties are, by default, disabled. These options impact device history only if you have
enabled the Device History feature.
• SERVER_DEVICE_HISTORY_IMMEDIATE_OP_ENABLE_KEY
Records OperationExecuted history for immediate operations.
• SERVER_DEVICE_HISTORY_PROXY_OP_ENABLE_KEY
Records the NewOperationQueued, OperationRemoved, and OperationExecuted history for
on-connect device operations.
Note
If you disable the SERVER_DEVICE_HISTORY_IMMEDIATE_OP_ENABLE_KEYproperty and enable the
SERVER_DEVICE_HISTORY_PROXY_OP_ENABLE_KEYproperty, the immediate operation is disabled
and the on-connect operation is enabled.
• SERVER_DEVICE_HISTORY_GEN_CONFIG_ENABLE_KEY
Records ConfigGenRequested history.
To enable or disable these properties from the administrator user interface:
Step 1
Step 2
Choose the Configuration > Defaults page.
Click the System Defaults link on the left corner of the screen.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
8-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 8 CPE History and Troubleshooting
Device Faults
Step 3
Click the radio buttons corresponding to the operation you want to enable or disable:
•
•
•
To enable recording the history of immediate operations, click the Enabled radio button
corresponding to Immediate Operation History.
To enable recording the history of on-connect operations, click the Enabled radio button
corresponding to On-Connect Operation History.
To enable recording the history of configuration generation, click the Enabled radio button
corresponding to Instruction Generation History.
To disable these operations, click the corresponding Disabled radio button.
Click Submit.
Step 4
Device Faults
In large installations, devices with recurring faults can cause bottlenecks and affect performance.
Recurring faults can result from a device malfunction or misconfiguration of Cisco BAC. You can use
Cisco BAC to detect recurring faults occurring at the RDU and the DPE servers through the Recurring
Device Faults feature.
You can also configure Cisco BAC to ignore and not store the CWMP faults reported by the CPE. The
fault values must be specified in the dpe.properties file with comma separation, for example,
/dpe/cwmp/fault/ignore=9003, 9801.
The DPE will filter the CPE faults with fault codes 9003 and 9801 while reporting the faults. This feature
is helpful when faults from Customer Premises Equipment (CPE) to Cisco BAC are expected for certain
standard operations such as a reboot or recurrent faults.
A recurrent fault is one that occurs many times over a short period of time, or one with high chances of
occurring repeatedly. For instance, a fault may occur when an attempt is made to configure a device and
if the device is missing a parameter.
Such a fault qualifies as recurring even if it happens only once, because this operation is executed on
every device contact. However, if a one-time device operation is initiated from the API and results in a
fault, this fault is returned to the API client in the operation response and is not considered to be
recurring.
Also, consider the following scenarios:
•
A configuration template at the RDU may refer to a property that was deleted from the system. Every
time the RDU tries to generate instructions for devices by using this template, an error occurs. This
error qualifies the device as the one causing a recurring fault and is reported to the user.
•
A device sends an invalid or incomplete Inform message because of a bug in the device firmware.
The same Inform is generated on every device contact. This problem also qualifies as a recurring
fault.
This feature provides details about the last fault for given devices as well as aggregated fault statistics
for the system as a whole, the RDU server, and each DPE server.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
8-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 8 CPE History and Troubleshooting
Device Faults
The following operations monitor device faults on the RDU and the DPE:
At the RDU:
Failures during instruction generation.
Failures during extension execution.
At the DPE:
Violations of the CPE WAN Management Protocol.
Failures during DataSync instruction processing, which is responsible for discovering data from a
device and updating the RDU.
Failures during FirmwareRules instruction processing, which is responsible for executing firmware
rules configured in the RDU firmware rules templates.
Failures during ConfigSync instruction processing, which is responsible for updating device
configuration according to RDU configuration templates.
Failures during UnknownDevice instruction processing, which is responsible for processing unknown
or unregistered devices.
The RDU and the DPE maintain a list of recurring faults. Each fault contains the date and time of
occurrence, the ID of the device, and a fault description.
Faults automatically expire and are purged from the system as soon as their lifetime expires. After a fault
is purged from the system, the statistics are adjusted accordingly.
Note
Cisco BAC limits the number of devices returned in the device fault list on the administrator user
interface to 1,000. If the number of devices with faults exceeds 1,000, the operator will see a message
stating that more devices have faults that just those on the screen.
To avoid impacting performance, Cisco BAC does not store fault information on the disk. If you restart
the server, you will lose fault data that was maintained by that server in its memory. However, if faults
repeat again, they are reported.
Retrieving Device Faults
Device fault information is available using the API and the administrator user interface.
From the API, you can call the following properties:
• Configuration.getRDUDetails—Returns the list of devices with faults at the RDU.
• Configuration.getDPEDetails—Returns the list of devices with faults at the DPE.
• IPDevice.getDetails—Returns information about faults related to the device.
From the administrator user interface, choose:
•
Servers > RDU—Displays device fault statistics at the RDU level and aggregated for all DPEs.
Statistics appear for the following periods of time by default: 1, 3, 12, and 72 hours.
•
Servers > Provisioning Groups > Manage Provisioning Groups > View Provisioning Group
Details—Displays device fault statistics for each DPE in a provisioning group.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
8-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 8 CPE History and Troubleshooting
Device Faults
•
Servers > DPEs > Manage Device Provisioning Engines > View Device Provisioning Engines
Details—Displays the number of devices with faults, if any. Against Device with Faults, click the
View Details icon. The Device Details page appears, detailing device fault statistics at the DPE
level.
Note
The Device with Faults option, along with the View Details icon, appears on the View
Device Provisioning Engines Details page only if there are devices with faults.
•
Devices > Manage Devices > Device Details—Displays the last fault, if any, for the selected device,
Figure 8-1
Fault Description on Device Details Page
Cisco BAC maintains details of the most recent device with fault at each server. On account of DPE
redundancy, a specific device over time will contact multiple DPEs, and may make it to a fault list on
one or each of those DPEs.
The same device may also have recurring faults at the RDU. Cisco BAC provides an aggregated view of
device faults at all servers. However on each server, no more than one fault for each device is tracked at
any given time. Any device with faults is removed from the memory when it expires.
You can configure the number of faults to be displayed on this page in the DPE using the property
/dpe/DeviceFaultCount. The default value of this property is 1000.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
8-8
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 8 CPE History and Troubleshooting
Device Troubleshooting
Managing Chatty Clients
In this release of Cisco BAC, you can use the Chatty client feature to detect devices that make an
excessive number of TR-069 or HTTP file server calls. You can use this feature to reduce the adverse
impact of Chatty devices on services that are provided to other devices.
Using this feature, you can detect the Chatty devices and throttle their access to the DPE. This feature
is enabled by default on the DPE. You can disable this feature from the DPE CLI, using the
The following properties are used to configure this feature on the DPE:
•
•
•
•
SampleTimeInterval—Indicates the duration, in seconds, for which the DPE monitors the activity
of a device. The default is 30 seconds.
SampleHitsToThrottle—Indicates the number of events received from the device during the sample
time interval. The default is 15.
QuietTimeInterval—Indicates the duration, in seconds, for which the DPE monitors the activity of
a throttled device. The default is 10 seconds.
QuietHitsToLeaveThrottled—Indicates the number of events received from the device during the
quiet time interval. The default is 5.
Cisco BAC uses the Chatty client filter to monitor the CPE events based on the device identifier. If the
number of events received from the device during the sample time interval is greater than the value
configured for the Sample-hits-to-throttle property, the DPE throttles the device. When a device is in a
throttled state, all events that the device generates, are discarded.
Cisco BAC continues to monitor the activity on the throttled device to determine whether the device can
be restored to the Normal state. If the device generates fewer events than the value configured for the
Sample-hits-to-throttle property, the DPE moves the device to the Quiet state.
While in the Quiet state,
•
If the number of events received from the device during the Quiet time interval is greater than the
value configured for the Quiet-hits-to-leave-throttled property, the DPE moves the device to
throttled state.
•
If the number of events received from the device during the quiet time interval is less than the value
configured for the Quiet-hits-to-leave-throttled property, the DPE restores the device to the Normal
state.
Device Troubleshooting
You can use this feature to collect highly detailed troubleshooting information about one or multiple
specific devices. Troubleshooting information includes all server interactions related to a given device
or a group of devices. This information includes administrator user interface operations, RDU API
operations, DPE interactions with the CPE, and inter-server DPE-to-RDU interactions.
You can enable or disable troubleshooting for one or a number of specific devices without turning
logging on, and without searching through log files for specific device information.
Cisco BAC maintains a list of devices, based on the device identifier, for which detailed troubleshooting
information is collected.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
8-9
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 8 CPE History and Troubleshooting
Device Troubleshooting
Troubleshooting information is stored centrally at the RDU and is maintained for each device. The DPEs
do not store this data. Instead, the DPE forwards this information to the RDU which writes it to the
device log file, troubleshooting.log, in the <BPR_DATA>/rdu/logs directory when it receives this
information.
If the connection from the DPE to the RDU is lost, any new troubleshooting events occurring on the DPE
are discarded. The logging of troubleshooting information resumes only after the RDU-DPE connection
is restored.
The troubleshooting.log file is different from other log files such as rdu.log, dpe.log, and audit.log. The
troubleshooting.log file only logs detailed troubleshooting information relating to a specific set of
devices in the troubleshooting mode.
Note
The tracking feature is turned off until one or more devices are added to the troubleshooting group.
When you enable or disable troubleshooting on a specific device, the change takes place immediately at
all servers (RDU and DPEs); you do not have to reboot the RDU or the DPEs. The log files on the
respective servers lists the current list of devices in the troubleshooting mode.
Caution
Additional memory and disk space is required whenever the device troubleshooting feature is used. As
the number of tracked devices increases, so does the amount of memory and disk space that is required
to support the number of logs that are created.
Configuring Device Troubleshooting
The Device Troubleshooting feature is disabled until one or more devices are put into troubleshooting
mode. This section describes how you can enable or disable troubleshooting for a device from the
administrator user interface. It also describes how to view a list of devices in troubleshooting mode and
how to view troubleshooting log for a given device.
You can configure the maximum number of devices in troubleshooting mode to prevent inadvertently
putting too many devices in this mode, and thus, diminishing server performance. By default, this
number is set at 100.
To configure the maximum number of the devices allowed in troubleshooting mode from the
administrator user interface, click the Systems Defaults page using the Configuration > Defaults tabs.
Enter a value in the Maximum Troubleshooting Device Count field.
Enabling Troubleshooting for a Device
To enable troubleshooting for a device, the device must be preregistered in the Cisco BAC RDU. If the
device is not yet preregistered, add the device from the Manage Devices page by clicking the Add button.
To enable troubleshooting for a device that already resides in the RDU database:
Step 1
Step 2
From the Manage Devices page, click the Search Type drop-down list, and select the Device Identifier
Click Search.
A list of devices appears.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
8-10
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 8 CPE History and Troubleshooting
Device Troubleshooting
Step 3
Click the Identifier link corresponding to the device that you want to track.
The Modify Device page appears, listing various device parameters.
Click the Enabled radio button corresponding to the Troubleshooting parameter.
Click Submit. Troubleshooting is now enabled for the device.
Step 4
Step 5
To verify if a given device is enabled for troubleshooting, you can access the Device Details page, and
view status against Troubleshooting.
Disabling Troubleshooting for a Device
To disable troubleshooting for a device:
Step 1
Step 2
From the Devices tab, locate the device that you want to delete. You can use one of the search types for
this purpose.
Click the Identifier link corresponding to the device that you want to delete from the troubleshooting list.
The Modify Device page appears.
Step 3
Step 4
Against the Troubleshooting parameter, click the Disabled radio button.
Click Submit.
Viewing List of Devices in Troubleshooting Mode
When you enable troubleshooting for a device, the device is automatically added to a special device
group which contains a list of devices in troubleshooting mode. The group type is system and the group
name is troubleshooting. You can access the list of devices in this group from the API or the
administrator user interface.
To view a list of devices currently enabled for troubleshooting:
Step 1
Step 2
From the Manage Devices page, click the Search Type drop-down list, and select Group Search.
From the Group (Group Type) drop-down list, select the troubleshooting (system) option to view all the
devices in troubleshooting mode.
Step 3
Click Search.
You can also see the list of devices in troubleshooting mode is by viewing the RDU log (rdu.log) and the
DPE log (dpe.log). The list of devices is logged whenever the server is started and whenever there is a
change in the list of devices that are enabled for troubleshooting.
The devices enabled for troubleshooting appear in the log files with the log level of 5-notification. For
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
8-11
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 8 CPE History and Troubleshooting
Device Troubleshooting
Viewing Device Troubleshooting Log
You can view the troubleshooting log file of a specific device in one of two ways.
•
Then, follow these steps:
Step 1
Step 2
When a list of the devices in troubleshooting mode appears, click the View Details icon corresponding
to a specific device.
The Device Details page appears.
Against View Troubleshooting Log, click the View Details icon.
The View Log File Contents page appears.
•
Complete the following procedure:
Step 1
Step 2
From the Manage Details page under the Devices tab, click the Search Type drop-down list, and select
the Device Identifier Option Search option. You can use the wildcard character (*) for this search.
Click Search.
A list of devices appears.
Step 3
Step 4
Click the View Details icon corresponding to the device whose log file you want to check.
The Device Details page appears.
Against View Troubleshooting Log, click the View Details icon.
The View Log File Contents page appears.
The color coding for the device troubleshooting log entries is:
•
•
BAC-TROUBLESHOOTINGINFO—Informational messages are marked in white.
BAC-TROUBLESHOOTINGINPUT—Details of messages received by Cisco BAC servers are
marked in grey.
•
•
BAC-TROUBLESHOOTINGOUTPUT—Details of messages sent by Cisco BAC servers are
marked in green.
BAC-TROUBLESHOOTINGERROR—Error messages are marked in red.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
8-12
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
9
Managing Cisco Broadband Access Center
This chapter describes the various subcomponents within Cisco Broadband Access Center (BAC) that
you can use to manage the system.
This chapter includes the following sections:
•
•
•
•
•
Cisco BAC Process Watchdog
The Cisco BAC process watchdog is an administrative process that monitors the runtime health of all
Cisco BAC processes. This watchdog process ensures that, if a process stops unexpectedly, it is
automatically restarted. One instance of the Cisco BAC process watchdog runs on every system which
runs Cisco BAC components.
You can use the Cisco BAC watchdog as a command-line tool to start, stop, restart, and determine the
status of any monitored processes.
You can enable the SNMP trap facility for Cisco BAC process watchdog. The SNMP traps are sent only
when:
•
•
there is a change in component’s state.
the component is gracefully shut down.
If a monitored application fails to start or stops unexpectedly, the Cisco BAC process watchdog reports
the criticial condition associated with the monitored application to the trap receiver through SNMP trap.
The Cisco BAC process watchdog will wait for a prescribed amount of time before attempting to restart
the monitored application. When the monitored application restarts, the Cisco BAC process watchdog
sends another SNMP trap to the SNMP trap receiver informing the change in application’s state.
At the beginning, restart attempt is made at an interval of 1 second, and is increased exponentially with
every subsequent attempt until the interval becomes 5 minutes. After that, the process restart is attempted
at 5-minute intervals until successful. Five minutes after a successful restart, the period is automatically
reset to 1 second again.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
9-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 9 Managing Cisco Broadband Access Center
Cisco BAC Process Watchdog
For example:
•
•
Process A fails.
The Cisco BAC process watchdog server sends an SNMP trap informing the critical condition
associated with the process A.
•
•
The Cisco BAC process watchdog server attempts to restart it and the first restart fails.
The Cisco BAC process watchdog server waits for 2 seconds, and attempts to restart it and the
second restart fails.
•
•
The Cisco BAC process watchdog server waits for 4 seconds, and attempts to restart it and the third
restart succeeds.
The Cisco BAC process watchdog server sends the SNMP trap to the trap receiver informing the
change in state of process A.
Using Cisco BAC Process Watchdog from the Command Line
The Cisco BAC watchdog agent automatically starts whenever the system boots up. Consequently, this
watchdog also starts those Cisco BAC system components installed on the same system. You can also
control the Cisco BAC watchdog through a simple command-line utility by running the
/etc/init.d/bprAgent command.
Table 9-1 describes the command line interface commands available for use with the Cisco BAC
watchdog process.
Table 9-1
Cisco BAC Watchdog Agent CLI Commands
Command
Description
bprAgent start
Starts the Cisco BAC watchdog agent, including all monitored
processes.
bprAgent stop
Stops the Cisco BAC watchdog agent, including all monitored
processes.
bprAgent restart
Restarts the Cisco BAC watchdog agent, including all monitored
processes.
bprAgent status
Gets the status of the Cisco BAC watchdog agent, including all
monitored processes.
bprAgent start process-name
bprAgent stop process-name
bprAgent restart process-name
Starts one particular monitored process. The value process-name
identifies that process.
Stops one particular monitored process. The value process-name
identifies that process.
Restarts one particular monitored process. The value
process-name identifies that process.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
9-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 9 Managing Cisco Broadband Access Center
Cisco BAC Process Watchdog
Table 9-1
Cisco BAC Watchdog Agent CLI Commands (continued)
Description
Command
bprAgent status process-name
Gets the status of one particular monitored process. The value
process-name identifies that process.
•
•
•
•
•
•
rdu—Specifies the RDU server.
dpe—Specifies the DPE server.
stun—Specifies the STUN server.
snmpAgent—Specifies the SNMP agent.
tomcat—Specifies the administrator user interface.
cli—Specifies the DPE command line interface.
When the operating system (Solaris and Linux) is rebooted, the Cisco BAC process watchdog is first
stopped, allowing Cisco BAC servers to shut down properly. To shut down or reboot the operating system
gracefully, use the init 6 command.
The reboot command does not execute application shut down hooks and kills Cisco BAC processes
rather than shutting them down. While this action is not harmful to Cisco BAC, it may delay server
start-up and skew certain statistics and performance counters.
The events that trigger an action in the Cisco BAC watchdog daemon, including process crashes and
restarts, are logged in a log file, <BPR_HOME>/agent/logs/agent.log. The watchdog daemon also logs
important events to syslog under standard local6facility.
Enabling SNMP Trap for Cisco BAC Process Watchdog
The Cisco BAC process watchdog can be configured to send SNMP traps to the trap receiver for all the
critical conditions of Cisco BAC components. The critical conditions include:
•
•
•
BAC process fails to start, restart, or stop
BAC process stops unexpectedly
Cisco BAC process watchdog fails to start or stop
The Cisco BAC process watchdog runs on the following BAC components:
•
•
•
•
•
•
RDU
DPE
CLI
Tomcat
SNMPAgent
STUNServer
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
9-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 9 Managing Cisco Broadband Access Center
Administrator User Interface
To enable SNMP trap for Cisco BAC process watchdog:
Log into Cisco BAC host as root.
Step 1
Step 2
Set the following parameters in CbsServerTable.xml file located at
<BPR_HOME>/snmp/xmlFiles/CISCO-BACC-SERVER-MIB:
•
•
cbsServerType - <component>
cbsNotifEnableFlags - 1
Step 3
Step 4
Configure the trap receiver to receive the SNMP traps from the BAC components. The trap receiver is
added as SNMP host with the required community and listening port. For information on how to add
Start, stop, or restart the BAC components or watchdog, and verify if the trap receiver receives the SNMP
traps.
Administrator User Interface
The Cisco BAC administrator user interface is a web-based application for central management of the
Cisco BAC system. You can use this interface to:
•
•
•
•
•
•
•
•
•
•
•
Configure global defaults
Define custom properties
Set up Classes of Service
Manage firmware rules and configuration templates
Add and edit device information
Group devices
Execute device operations
View server status and statistics
View device history
View server logs
Manage users
Refer to these chapters for specific instructions on how to use this interface:
•
•
•
Understanding the Administrator User Interface, page 15-1, describes how to access and configure
the Cisco BAC administrator user interface.
Using the Administrator User Interface, page 16-1, provides instructions for performing
administrative activities involving the monitoring of various Cisco BAC components.
Configuring Broadband Access Center, page 17-1, describes tasks that you perform to configure
Cisco BAC.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
9-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 9 Managing Cisco Broadband Access Center
Command Line Interface
Command Line Interface
The Cisco BAC CLI is an IOS-like command line interface which you use to configure as well as view
the status of the DPE by using Telnet. The CLI supports built-in command help and command
autocompletion.
You can enable authentication of the CLI through a locally configured login and enable passwords, or
through a remote username and password for a TACACS+ service.
To access the DPE CLI, open a Telnet session to port 2323 from a local or remote host.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
9-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 9 Managing Cisco Broadband Access Center
SNMP Agent
Accessing the DPE CLI from a Local Host
To access the CLI from a local host, you can use:
# telnet localhost 2323
or
# telnet 0 2323
Accessing the DPE CLI from a Remote Host
To access the CLI from a remote host, enter:
# telnet remote-hostname 2323
Note
If you cannot establish a Telnet connection to the CLI, the CLI server might not be running. You may
need to start the server; enter:
# /etc/init.d/bprAgent start cli
After you access the CLI, you must enter the DPE password to continue. The default login and enable
passwords are changeme.
commands that a DPE supports.
SNMP Agent
Cisco BAC provides basic SNMP v2-based monitoring of the DPE and RDU servers. The Cisco BAC
SNMP agents support SNMP informs and traps. You can configure the SNMP agent on the DPE by using
the snmp-server CLI commands, and on the RDU by using SNMP configuration CLI commands.
The SNMP agent also provides support for monitoring essential Cisco BAC details, such as server state,
server-specific statistics, communication between servers, and license information.
For additional information on the SNMP configuration command line tool, see Monitoring Cisco
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
9-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 9 Managing Cisco Broadband Access Center
Cisco BAC Tools
Cisco BAC Tools
Cisco BAC provides automated tools that you use to perform certain functions more efficiently.
Table 9-2 lists the various tools that this Cisco BAC release supports:
Table 9-2
List of Cisco BAC Tools
Tool
Description
Refer ...
Configuration Tool
Used to test, validate, and view
Cisco BAC template and
configuration files.
Cisco BAC Process
Watchdog
Interacts with the Cisco BAC
watchdog daemon to observe the
status of the Cisco BAC system
components, and stop or start
servers.
Tool
output.
RDU Log Level Tool
the Cisco BAC backup database
and exports the information to a flat
file.
Device Export Tool
Sets threshold values for one or
more file systems. When these
thresholds are surpassed, an alert is
generated until additional disk
space is available.
services on the DPE.
Keytool Utility
Enables you to temporarily reset
bacadmin authentication to local
RDU, when TACACS+
authentication is enabled.
Password Reset Tool
Event Monitor Tool
output.
Used to view the events that are
being fired in Cisco BAC.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
9-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 9 Managing Cisco Broadband Access Center
Cisco BAC Tools
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
9-8
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
10
Database Management
This chapter contains information on RDU database management and maintenance. The RDU database
is the Broadband Access Center (BAC) central database. The Cisco BAC RDU requires virtually no
maintenance other than to ensure availability of sufficient disk space. As the administrator, you must
understand and be familiar with database backup and recovery procedures.
This chapter includes the following sections:
•
•
•
•
•
Understanding Failure Resiliency
The RDU database uses a technique known as Write-ahead logging to protect against database
corruption that could result from unforeseen problems, such as an application crash, system failure, or
power outage.
Write-ahead logging involves writing a description of any database change to a database log file before
writing the change into the database files. This mechanism allows the repair of any incomplete database
writes that can result from system failures.
The RDU server performs an automatic recovery each time it is started. During this recovery process,
the database log files are used to synchronize the data with the database files. Database changes that were
written into the database log, but not into the database, are written into the database during this automatic
recovery.
In this way, write-ahead logging virtually guarantees that the database does not become corrupted when
the RDU server crashes because the database is automatically repaired when the RDU server is restarted.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
10-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 10 Database Management
Database Files
Write-ahead logging requires these conditions to work properly:
•
You must set up the file system and physical storage so that they guarantee that the data is flushed
to physical storage when requested. For example, a storage system with SDRAM-only write cache,
which loses data during system failure, is not appropriate.
However, a disk array with battery-backup write cache that guarantees that the data gets persisted,
even in the event of a system failure, is acceptable. A system without battery-backed write cache
should flush data disk when requested instead of performing in-memory data caching.
•
You must set up the file system with a 8192-byte block size to match the RDU database block size.
This setting is usually the default unless explicitly adjusted.
Database Files
The RDU database stores data in binary files using the file system you have mounted on the partition
containing the files. It is essential to choose and configure a file system in a way that it is not susceptible
to long recovery times after system failures.
Database files are vital to the operation of the RDU. Therefore, take extra precautions to safeguard them
against accidental removal or other manual manipulation. Follow standard system administration
practices to safeguard these important files.
For example, these files should always have permissions that allow only root user access. Additionally,
it is a good practice to never log into your production system as a root user, but rather log in as a less
privileged user and use the sudo command to perform tasks requiring root privileges.
Database Storage File
The RDU server stores its database in a file called bpr.db, which resides in the database directory. This
directory is located in the <BPR_DATA>/rdu/db directory and is configured by specifying the
for additional information on moving the database.
Note
The database file is normally accessed in a random fashion. You should therefore, select a disk with the
fastest seek time and rotational access latency to obtain the best database performance.
Database Transaction Log Files
The RDU server stores database transaction logs in 10-MB files that are stored in the database log
directory. You configure this directory during installation by specifying the <BPR_DBLOG> parameter.
The log directory is located in the <BPR_DBLOG>/rdu/dblog directory. See Changing Database
Location, page 10-7, for additional information on moving the transaction logs to a new directory.
Database log files are named in numeric sequence, starting at log.00000001, log.00000002, and so on.
Note
The disk on which transaction logs are stored is usually accessed in a sequential manner, with data being
appended to the log files. Select a disk that can efficiently handle this access pattern to achieve the best
database performance. We recommend that you locate the database transaction logs directory on the
fastest disk on the system. Also, ensure that 1 GB disk space is available.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
10-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 10 Database Management
Disk Space Requirements
Automatic Log Management
Database transaction logs files are used to store transaction data until that data is completely written into
the database. After that, the transaction log data becomes redundant and the files are then automatically
removed from the system. Under normal circumstances there should be only a few log files in the
database transaction log directory. Over time, you will notice that older transaction logs disappear and
newer ones are created.
Caution
Database transaction logs are an integral part of the database. Manual deletion of transaction log files
will result in database corruption.
Miscellaneous Database Files
The database directory contains additional files that are essential to database operation. These files, in
addition to the rdu.db file, are found in the <BPR_DATA>/rdu/db directory and are copied as part of the
database backup:
•
DB_VERSION—Identifies the physical and logical version of the database and is used internally by
the RDU.
•
history.log—Used to log activity about essential database management tasks, such as automatic log
file deletion, backup, recovery, and restore operations. In addition to providing useful historical
information for the administrator, this log file is essential to RDU database operation.
Disk Space Requirements
The size of a fully populated database depends on a number of factors:
•
•
•
Device objects that the RDU manages.
Custom properties stored on each object.
Device history records tracked for each device.
The approximate estimates for disk space required on each partition are:
•
•
<BPR_DATA>, approximately 3 to 5 KB per device object
<BPR_DBLOG>, at least 500 MB
Caution
These numbers are provided as a guideline only and do not eliminate the need for normal system
monitoring.
You can use the disk_monitor.sh tool to monitor available disk space and alert the administrator. See
Using the disk_monitor.sh Tool, page 20-4, for additional information.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
10-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 10 Database Management
Backup and Recovery
Handling Out of Disk Space Conditions
When the RDU server runs out of disk space, it generates an alert through the syslog facility and the
RDU log. The RDU server then tries to restart automatically. When attempting to restart, the RDU server
may again encounter the out of disk spaceerror and attempt to restart again.
The RDU server continues trying to restart until free disk space becomes available. Once you free up
some disk space on the disk that is operating near a limit, the next time the RDU restarts it will succeed.
If the size of your database grows beyond the capacity of the current disk partition, then you should move
the database to a new disk or partition. For information on how to do this, see Changing Database
Note
It is a good practice to monitor disk space utilization to prevent failure. See Using the disk_monitor.sh
Tool, page 20-4, for additional information.
Backup and Recovery
The RDU server supports a highly efficient backup process that can be performed without stopping the
server or suspending any of its activities. Database backup and recovery involves these stages:
•
•
•
Backup—Takes a snapshot of the RDU database from a live server.
Recovery—Prepares the database snapshot for re-use.
Restore—Copies the recovered database snapshot to the RDU server.
Automated tools are provided for each of these steps. You can use these tools in either interactive mode
or silent mode, but you must have root privileges to use the tools.
Note
A non root user is provided with privilege to create directory only under the directories with non root
access.
Database Backup
Backup is the process of copying the database files into a backup directory. The files can then be
compressed and placed on tape or other archive.
RDU database backup is highly efficient because it involves just copying files without interrupting
server activity. However, because it involves accessing the RDU database disk, backup may adversely
affect RDU performance. The opposite is also true; RDU activity happening during backup will
adversely affect backup performance. Therefore, you should perform backups during off-peak hours.
Other than concurrent system activity, backup performance also depends on the underlying disk and file
system performance. Essentially, backup will perform as fast as database files can be copied from source
to target.
Use the backupDb.sh tool, in the <BPR_HOME>/rdu/bin directory, to perform database backups:
•
To use this tool, you must provide the target directory where the backup files will be placed. This
directory should be on a disk or partition that has available disk space equivalent to 120% of the
current database file size.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
10-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 10 Database Management
Backup and Recovery
•
As illustrated in the following example, this tool automatically creates a time stamped subdirectory,
under the directory you specify and places the backups there.
Examples
Here is an example of using the backupDb.sh tool:
# backupDb.sh /var/backup
where /var/backup identifies the database backup directory.
In this example, all backup database files are stored in a directory called /var/backup/rdu-backup-
09252002-130345. The last subdirectory (rdu-backup-20020925-130345) is automatically created with
a current timestamp.
Note
Note
The timestamped subdirectory format is rdu-backup-yyyyMMdd-HHmmss. In this example, the
subdirectory would be rdu-backup-04272006-175430, meaning that the directory contains a backup that
was started at 5:54:30 pm on April 27, 2006.
The backupDb.sh tool also reports progress to the screen and logs its activity into history.log.
When using the backupDb.sh tool, you can use a –help option to obtain usage information. You can also
use the optional –nosubdir flag to disable, if necessary, the automatic creation of the subdirectory.
Database Recovery
Database recovery is the process of restoring the database to a consistent state. Since backup is
performed on a live RDU, the database can be changing while it is being copied. The database log files,
however, ensure that the database can be recovered to a consistent state.
Recovery is performed on a snapshot of a database. In other words, this task does not involve touching
the database on the live RDU server. The recovery task can be performed either immediately following
a backup or prior to restoring the database to the RDU server.
Note
We recommend that you perform database recovery immediately after each backup. This way, the backed
up database can be more quickly restored in case of emergency.
The duration of database recovery depends on the number of database log files that were copied as part
of the backup, which in turn depends on the level of RDU activity at the time of the backup. The more
concurrent activity RDU experiences during the backup, the more transaction log files have to be copied
as part of the backup and the longer is the recovery. Generally, recovering a database takes from 10 to
60 seconds per transaction log file.
Use the recoverDb.sh tool, located in the <BPR_HOME>/rdu/bin directory, to perform recovery of the
snapshot of a database. When you use this tool, you must provide the location of the backup. This is also
the directory in which the recovery will be performed.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
10-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 10 Database Management
Backup and Recovery
Examples
Here is an example of using the recoverDb.sh tool:
# recoverDb.sh /var/backup/rdu-backup-20060427-130345
In this example, the snapshot located in the /var/backup/rdu-backup-20060427-130345 directory will be
recovered to a consistent state. The progress of the recovery operation will appear on screen and the
activity will be recorded in the history.log file in the snapshot directory.
Note
When using the recoverDb.sh tool, you can use the –help option to obtain usage information on the tool.
Database Restore
Restoring the database is the process of copying the previously recovered database snapshot to the
database location used by the RDU server. Only a database that has been previously recovered can be
restored.
Since restoring the database means replacing the current RDU database, it is very important that you first
properly remove and archive the old database.
Note
Note
Never delete the database you are replacing. You might need a copy of an old database to simplify future
system diagnostics.
Use the restoreDb.sh tool, located in the <BPR_HOME>/rdu/bin directory, to replace the current RDU
database with another database. When using this tool, you must specify an input directory. This directory
must contain the recovered backup snapshot of the database to be restored to the RDU server.
Before running the restoreDb.sh tool, you must stop the RDU server. Also, remember to back up the
database, then remove the database files from the rdu/db and the rdu/dblog directories.
Examples
Here is an example of running the restoreDb.sh tool:
# restoreDb.sh /var/backup/rdu-backup-20060427-130345
In this example, the database found in the /var/backup/rdu-backup-200604275-130345 directory is
restored to the RDU server.
Note
When using the restoreDb.sh tool, you can use the –help option to obtain usage information on the tool.
You must restart the RDU after the restore operation is completed. The RDU log file will contain
successful startup messages.
This tool displays progress on the monitor and logs its activity in the history.log file.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
10-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 10 Database Management
Changing Database Location
Changing Database Location
You can move the database from one partition or disk to another on the same system. You might
sometimes want to do this for administrative reasons. This process requires stopping the RDU server and
the Cisco BAC process watchdog.
The process of changing the database location involves changing system parameters and copying the
appropriate files to the new location. You can adjust one or both of the following parameters:
•
<BPR_DATA>—This parameter is initially set during installation and points to a directory that is
used to store the database, and many other important files, such as logs, configuration files, and so
on.
This directory also stores log data for the Cisco BAC process watchdog, the DPE (if installed on the
same system), RDU, and SNMP agent, among others.
•
<BPR_DBLOG>—This parameter is initially set during installation and points to the directory that
stores database transaction log files.
The values for the above parameters are recorded in a file called <BPR_DATA>/bpr_definitions.sh. Any
change to this file requires that you restart all BAC components running on the system.
To change the location of the database and transaction logs:
Step 1
Run the /etc/init.d/bprAgent stop command to stop the BAC process watchdog and all Cisco BAC
components.
Step 2
Step 3
Make a backup copy of <BPR_HOME>/bpr_definitions.sh file.
Edit the file and change either or both the <BPR_DATA> and <BPR_DBLOG> parameters to new
directories.
Step 4
Step 5
Save the file.
Copy or move the directory structure and contents of the original <BPR_DATA> and/or
<BPR_DBLOG> directories to new location(s). If you make a copy, ensure that all file and directory
permissions are preserved.
Step 6
Step 7
Run the /etc/init.d/bprAgent start command to start the BAC process watchdog and all BAC
components.
Monitor the appropriate log files to ensure that all components have successfully started.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
10-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 10 Database Management
Changing Database Location
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
10-8
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
11
Monitoring Cisco Broadband Access Center
This chapter describes how you can monitor the central RDU servers and the DPE servers in a Cisco
Broadband Access Center (BAC) deployment.
This chapter includes the following sections:
•
•
•
•
•
Syslog Alert Messages
Cisco BAC generates alerts through the syslog service. Syslog is a client-server protocol that manages
the logging of information. Cisco BAC syslog alerts are not a logging service; they provide a notification
that a problem exists, but do not necessarily define the specific cause of the problem. You might find this
information in the appropriate Cisco BAC log files.
Message Format
When Cisco BAC generates an alert message, the format is:
XXX-#-####: Message
•
XXX—Identifies the facility code, which can include:
–
–
–
RDU (regional distribution unit).
DPE (device provisioning engine).
AGENT (Cisco BAC process watchdog).
• #—Identifies the severity level in use. The three levels of alerts are:
–
–
–
1, which is alert.
3, which is error.
6, which identifies informational messages.
• ###—Identifies the numeric error code as described in the following sections.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Syslog Alert Messages
•
Message—Provides the alert text or message.
RDU Alerts
Table 11-1 identifies the RDU alerts.
Table 11-1
RDU Alerts
Alert
Description
RDU-1-101: RDU ran out of disk space
Indicates that the storage partition that the RDU
server uses ran out of space. After encountering
this error, the RDU attempts to restart
automatically, but will typically encounter the
same error again until more storage space is
available.
Concepts, page 20-1, for additional information
on upgrading the disk.
RDU-1-103: RDU ran out of memory
Indicates that the RDU ran out of memory. After
encountering this error, the RDU server restarts
automatically.
RDU-1-111: Evaluation key for technology
[technology_name] expired
Appears if an evaluation key for the technology
specified expires. You must contact Cisco sales or
TAC for a new license key.
RDU-1-115: You have used [percent]percent of
available [technology_name] licenses
Identifies the quantity of licences used (in
percentage) out of the total number of allowable
licenses. Appears when you reach 80% of the
license capacity.
BPR-RDU-4-1140: DNS took X seconds for
Indicates that Cisco BAC performance may be
lookup of address [10.0.0.1/test.com]; Check DNS slow due to delayed response from the DNS. The
configuration and health of servers
alert is generated whenever IP Address look-up
takes more than 60 seconds.
Note
Whenever an RDU syslog alert is sent, additional details (if any) can be found in log file
<BPR_DATA>/rdu/logs/rdu.log.
DPE Alerts
Whenever a DPE syslog alert is sent, you can find additional details in the DPE logs.
Some DPE errors are also propagated to the RDU server log files. You can find these in the
<BPR_DATA>/rdu/logs/rdu.log file.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Syslog Alert Messages
Table 11-2 identifies the DPE alerts.
Table 11-2
DPE Alerts
Alert
Description
DPE-1-102: DPE ran out of disk space
The storage partition that the DPE server uses ran
out of space. You have three options:
a. Clear out any excess support bundles that may
reside on the disk.
You can do this by moving those support
bundles to another machine and then running
the clear bundles command from the DPE
CLI.
b. Run the clear logs command from the DPE
CLI to clear more disk space.
c. As a last resort, run the clear cache command
from the DPE CLI to remove any cache files
and force the DPE to resynchronize with the
RDU server.
DPE-1-104: DPE ran out of memory
The DPE process ran out of memory. After
encountering this error condition, the DPE restarts
automatically.
Determine how many device configurations are on
the DPE; the larger the number of device
configurations, the more memory is used.
To reduce device configurations, limit the number
of devices in the provisioning groups that the DPE
serves.
DPE-1-109: Failed to connect to RDU
The RDU cannot be contacted. You must:
a. Verify that the DPE network is configured and
connected correctly.
Clear:
b. Check that the DPE is configured to connect to
the proper RDU, and that the connecting port
is configured properly by using the dpe
rdu-server command.
DPE-1-123: Successfully connected to RDU
c. Check that the RDU process is running on the
correct server and listening on the correct port.
The DPE attempts to reconnect to the RDU
process every few seconds until a connection
is established.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Syslog Alert Messages
Table 11-2
DPE Alerts (continued)
Alert
Description
DPE-1-125: Configured extension script file is
missing
The configured script file is not available in the
DPE cache. This alert will be fired only once per
script.
This error cannot be manually cleared. Once the
error is cleared, a clear alert is fired.
Clear:
DPE-1-126: Configured extension script file is
available
DPE-1-127: Configured extension script file
failed for the device
The configured script for a device has failed. This
alert will be fired only once for a script failure per
device.
This error cannot be manually cleared. Once the
error is cleared, a clear alert is fired.
Clear:
DPE-1-128: Configured extension script file
executed for the device
Watchdog Agent Alerts
Whenever the watchdog process sends a syslog alert, you can find error details (if any) in the
<BPR_DATA>/agent/logs/agent_console.log file and the log files corresponding to the specific
component mentioned in the alert (if any).
For example, if you receive an alert similar to The rdu unexpectedly terminated, you would check
identifies the watchdog agent alerts.
Table 11-3
Watchdog Agent Alerts
Alert
Description
AGENT-3-9001: Failed to start the component
Indicates that the watchdog has failed to start the
specified component.
AGENT-3-9002: The component unexpectedly
terminated
Indicates that the specified component, that the
agent process monitors, unexpectedly failed.
AGENT-3-9003: Failed to stop the component
Indicates that a component did not stop when the
watchdog agent attempted to stop it.
AGENT-6-9004: The component has started
Is generated any time the watchdog agent
successfully starts a component. This message is
for informational purposes only.
AGENT-6-9005: The component has stopped
Is generated any time the watchdog agent a
successfully stops a component. This message is
for informational purposes only.
The component variable presented in the watchdog agent alerts list shown in Table 11-3 represents any
of these component values:
•
•
rdu
dpe
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Monitoring Servers by Using SNMP
•
•
•
•
stun
tomcat
cli
snmpAgent
Access Registrar Extension Point Alerts
Whenever a Cisco BAC Access Registrar extension point syslog alert is sent, you can find additional
details in the Access Registrar log file in <AR_HOME>/logs/name_radius_1_log.
Table 11-4
Access Registrar Extension Point Alerts
Alert
Description
Error:
The Access Registrar failed to initialize the
background threads and queue in the extension
point service.
Auth HTTP Adapter: Failed to initialize
Background thread pool and Request queue, due
to Exception_message
Clear:
Auth HTTP Adapter: Background thread pool and
Request queue initialized successfully.
Error:
The Access Registrar failed to initialize the HTTP
connection manager in the extension point service.
Auth HTTP Adapter: Failed to initialize Http
connections, due to Exception_message
Clear:
Auth HTTP Adapter: Http connections initialized
successfully.
Error:
The alert message will be sent if the Extension
point could not find a usable DPE Auth service.
Auth HTTP Adapter: Extension point unable to
find a usable Auth Service.
Clear:
Auth HTTP Adapter: HTTP message POST
successful.
Monitoring Servers by Using SNMP
Cisco BAC supports management of servers using SNMP. Specifically, an SNMP-based management
system can be used to monitor Cisco BAC server state, license utilization information, server
connections, and server-specific statistics.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Monitoring Servers by Using SNMP
SNMP Agent
The Cisco BAC SNMP agents support SNMP informs and traps, collectively called as notifications
hereafter. You can configure the SNMP agent on the DPE by using snmp-server CLI commands, and on
the RDU by using the snmpAgentCfgutil.sh tool.
additional information on the DPE CLI.
MIB Support
Cisco BAC supports several different MIBs. These include:
•
•
•
CISCO-BACC-DPE-MIB
CISCO-BACC-RDU-MIB
CISCO-BACC-SERVER-MIB
Table 11-5 summarizes the MIB support in Cisco BAC:
Table 11-5 Cisco BAC-Supported MIBs
Installation Component
MIBs Supported
DPE
CISCO-BACC-SERVER-MIB
CISCO-BACC-DPE-MIB
CISCO-BACC-SERVER-MIB
CISCO-BACC-RDU-MIB
RDU
The RDU SNMP agent supports the CISCO-BACC-RDU-MIB, which defines managed objects for the
RDU. This MIB defines statistics related to the state of the RDU and the statistics on the communication
interface between the RDU and DPE.
The DPE SNMP agent supports the CISCO-BACC-DPE-MIB, which defines managed objects for the
DPE. This MIB provides some basic DPE configuration and statistics information.
The SNMP agent supports the CISCO-BACC-SERVER-MIB. This MIB defines the managed objects
that are common to all servers on Cisco BAC. This MIB supports the monitoring of multiple Cisco BAC
servers when they are installed on the same device. The ciscoBaccServerStateChangednotification is
generated every time a server state change occurs.
Note
For a description of all objects, refer to the corresponding MIB files under the <BPR_HOME>/rdu/mibs
directory.
Using the snmpAgentCfgUtil.sh Tool
You can use the snmpAgentCfgUtil.sh tool to manage the SNMP agent.
By using this tool, which is located in the <BPR_HOME>/snmp/bin directory, you can add (or remove)
your host to a list of other hosts that receive SNMP notifications, and start and stop the SNMP agent
process.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Monitoring Servers by Using SNMP
Note
The default port number of an SNMP agent is 8001.
You can use the snmpAgentCfgUtil.sh tool for:
•
•
•
•
•
•
•
•
•
Adding a Host
You use this command to add the host address to the list of hosts that receive SNMP notifications from
the SNMP agent.
Syntax Description
snmpAgentCfgUtil.shadd host host-addr community community [udp-port port]
•
•
•
host-addr—Specifies the IP address of the host that you want to add to the list of hosts.
community—Specifies the community (read or write) to use while sending SNMP notifications.
port—Identifies the UDP port used for sending the SNMP notifications.
Examples
# ./snmpAgentCfgUtil.sh add host test.cisco.com community trapCommunity udp-port 162
OK
Please restart [stop and start] SNMP agent.
Note
The changes that you introduce through this command do not take effect until you restart the
SNMP agent by using the /etc/init.d/bprAgent restart snmpAgent command. For detailed
Deleting a Host
Syntax Description
OL-27172-01
You use this command to remove a host from the list of those receiving SNMP notifications from the
SNMP agent.
snmpAgentCfgUtil.shdelete host host-addr
host-addr—Specifies the IP address of the host that you want to delete from the list of hosts.
Cisco Broadband Access Center 3.8 Administrator Guide
11-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Monitoring Servers by Using SNMP
Examples
# ./snmpAgentCfgUtil.sh delete host test.cisco.com
OK
Please restart [stop and start] SNMP agent.
Note
The changes that you introduce through this command do not take effect until you restart the
SNMP agent by using the /etc/init.d/bprAgent restart snmpAgent command. For detailed
Adding an SNMP Agent Community
You use this command to add an SNMP community string to restrict access to the SNMP agent. The
SNMP community name is used as a shared secret, with SNMP managers accessing the Cisco BAC
SNMP agent.
Syntax Description
snmpAgentCfgUtil.sh add community string [ro | rw]
•
•
string—Identifies the SNMP community.
ro—Assigns a read-only (ro) community string. Only get requests (queries) can be performed. The
ro community string allows get requests, but no set operations. The network management system
and the managed device must reference the same community string.
•
rw—Assigns a read-write (rw) community string. SNMP applications require read-write access for
set operations. The rw community string enables write access to object identifier (OID) values.
Note
The default ro and rw community strings are bacread and bacwrite, respectively. Cisco
recommends that you change these values before deploying Cisco BAC. To change them, add
new community names and delete the default ones.
Examples
# ./snmpAgentCfgUtil.sh add community fsda54 ro
OK
Please restart [stop and start] SNMP agent.
Note
The changes that you introduce through this command do not take effect until you restart the
SNMP agent by using the /etc/init.d/bprAgent restart snmpAgent command. For detailed
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-8
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Monitoring Servers by Using SNMP
Deleting an SNMP Agent Community
You use this command to delete an SNMP community string to prevent access to the SNMP agent.
Syntax Description
snmpAgentCfgUtil.sh delete community string [ro | rw]
•
•
•
string—Identifies the SNMP community
ro—Assigns a read-only (ro) community string
rw—Assigns a read-write (rw) community string
Note
Examples
# ./snmpAgentCfgUtil.sh delete community fsda54 ro
OK
Please restart [stop and start] SNMP agent.
Note
The changes that you introduce through this command do not take effect until you restart the
SNMP agent by using the /etc/init.d/bprAgent restart snmpAgent command. For detailed
Starting the SNMP Agent
You use this command to start the SNMP agent process on which Cisco BAC is already installed.
Note
You can also start the SNMP agent by invoking the Cisco BAC watchdog process agent by using the
Examples
# ./snmpAgentCfgUtil.sh start
Process snmpAgent has been started
Stopping the SNMP Agent
You use this command to stop the SNMP agent process on any Solaris computer on which Cisco BAC is
already installed.
Note
You can also stop the SNMP agent by invoking the Cisco BAC watchdog process agent by using the
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-9
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Monitoring Servers by Using SNMP
Examples
# ./snmpAgentCfgUtil.sh stop
Process snmpAgent has stopped
Configuring an SNMP Agent Listening Port
You use this command to specify the port number to which the SNMP agent will listen. The default port
number that the RDU SNMP agent uses is 8001.
Syntax Description
Examples
snmpAgentCfgUtil.sh udp-port port
port— Identifies the port number to which the SNMP agent will listen.
# ./snmpAgentCfgUtil.sh udp-port 8001
OK
Please restart [stop and start] SNMP agent.
Changing the SNMP Agent Location
You use this command to enter a string of text that you use to indicate the location of the device running
the SNMP agent. For example, you could use this string to identify the physical location of the device.
You can enter any string up to 255 characters long.
Syntax Description
Examples
snmpAgentCfgUtil.sh location location
location—Specifies the character string identifying the agents location.
In this example, the physical location of the SNMP agent is in an equipment rack identified as equipment
rack 5D:
# snmpAgentCfgUtil.sh location “equipment rack 5D”
Setting Up SNMP Contacts
You use this command to enter a string of text that you use to identify the contact person for the SNMP
agent, together with information on how to contact this person. For example, you could use this string
to identify a specific person including that person’s telephone number. You can enter any string up to
255 characters long.
Syntax Description
snmpAgentCfgUtil.sh contact contact-info
contact-info— Specifies the character string identifying the individual to contact concerning the SNMP
agent.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-10
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Monitoring Servers by Using SNMP
Examples
In this example, the contact name is Ace Duffy and the telephone extension is 1234:
# ./snmpAgentCfgUtil.sh contact “Ace Duffy - ext 1234”
Displaying SNMP Agent Settings
You use this command to display all current SNMP settings.
Syntax Description
Examples
snmpAgentCfgUtil.sh show
# ./snmpAgentCfgUtil.sh show
Location
Contact
: Washington_1
: John
Port Number
: 8001
Notification Type
: trap
Notification Recipient Table :
[ Host IP address, Community, UDP Port ]
[ 10.10.10.1, public, 162 ]
Access Control Table
:
Read Only Communities
bacread
Read Write Communities
bacwrite
Specifying SNMP Notification Types
You use this command to specify which types of notifications (traps or informs) the SNMP agent will
send. By default, the agent sends traps; although you can set this to send SNMP informs instead.
Note
For the SNMP trap feature to work, you must enable the notification flag. In other words, the value for
the MIB variable 0cbsNotifEnableFlags (OID = .1.3.6.1.4.1.9.9.349.1.1.1.1.5.1) must be set to 1.
Syntax Description
snmpAgentCfgUtil.sh inform [retries retry_count timeout timeout] | trap
Where the parameter is the back-off timeout between retries.
Examples
snmpAgentCfgUtil.sh inform retries 3 timeout 1000
OK
Please restart [stop and start] SNMP agent.
Note
Use the snmpAgentCfgUtil.sh show command to verify your configuration settings.
# ./snmpAgentCfgUtil.sh show
Location
Contact
: <unknown>
: <unknown>
: 8001
Port Number
Notification Type
Notification Retries
: inform
: 3
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-11
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Monitoring Server Status
Notification Timeout
Notification Recipient Table :
[ Host IP address, Community, UDP Port ]
Access Control Table
: 1000
:
Read Only Communities
bacread
Read Write Communities
bacwrite
Monitoring Server Status
This section describes how you can monitor the performance of the RDU and DPE servers in a Cisco
BAC deployment. These servers are the central RDU server and the DPE servers.
You can check server statistics from the:
•
•
•
Administrator user interface
DPE CLI
RDU and DPE log files using the administrator user interface or the DPE CLI.
Using the Administrator User Interface
To view server statistics available on the administrator user interface:
Step 1
Step 2
On the Primary Navigation Bar, click the Server tab.
The Secondary Navigation Bar displays your options: DPEs, Provisioning Group, RDU.
Click the:
•
•
DPEs tab to monitor all DPEs currently registered in the Cisco BAC database.
RDU tab to display RDU status and statistics.
Step 3
If you clicked:
•
DPEs—The Manage Device Provisioning Engine page appears. Each DPE name on this page is a
link to another page that shows the details for that DPE. Click this link to display the details page.
•
RDU—The View Regional Distribution Unit Details page appears.
Using the DPE CLI
You can run the show dpe command to view the status of the DPE server. This command does not
indicate if the DPE is running successfully, only that the process itself is currently executing. However,
when the DPE is running, you can use statistics that this command displays to determine if the DPE is
successfully servicing requests.
You can use the show run command to view the current configuration settings on the DPE.
Example 11-1 show dpe Output
dpe# show dpe
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-12
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Monitoring Server Status
BAC Agent is running
Process dpe is not running
This result occurs when the DPE is not running.
dpe# show dpe
BAC Agent is running
Process dpe is running
Broadband Access Center [BAC 3.8 <SOL_BAC_3_5_200081208_1446>].
Connected to RDU
Caching 10001 device configs and [3] files.
100 sessions succeeded and 12 sessions failed.
200 file requests succeeded and 3 file requests failed.
34 immediate device operations succeeded, and 0 failed.
12 home PG redirections succeeded, and 0 failed.
Using Signature key name [] with a vality of [3600].
Running for [12] days [20] hours [59] mins [5] secs.
This result occurs when the DPE is running.
Example 11-2 show run output
dpe# show run
dpe service-auth xml-schema enable true
dpe shared-secret <value is set>
interface ip 10.86.147.122 pg-communication
log level 5-notification
no debug
service auth 1 address 127.0.0.1
service auth 1 enabled true
service auth 1 port 7551
service auth 1 ssl enabled false
service cwmp 1 client-auth digest
service cwmp 1 enabled true
service cwmp 1 port 7547
service cwmp 1 ssl cipher all-cipher-suites
service cwmp 1 ssl client-auth none
service cwmp 1 ssl enabled false
service cwmp 1 ssl keystore server-certs <value is set> <value is set>
service cwmp 2 client-auth digest
service cwmp 2 enabled false
service cwmp 2 port 7548
service cwmp 2 ssl cipher all-cipher-suites
service cwmp 2 ssl client-auth none
service cwmp 2 ssl enabled true
service cwmp 2 ssl keystore server-certs <value is set> <value is set>
service cwmp session timeout 60000
service cwmp-redirect 1 attempts 3
service cwmp-redirect 1 limit 20
service cwmp-redirect 1 lookup enabled true
service cwmp-redirect 1 respond enabled true
service cwmp-redirect 1 retry-after-timeout 60
service cwmp-redirect 1 status-period 5000
service cwmp-redirect 1 timeout 500
service http 1 client-auth digest
service http 1 enabled true
service http 1 port 7549
service http 1 ssl cipher all-cipher-suites
service http 1 ssl client-auth none
service http 1 ssl enabled false
service http 1 ssl keystore server-certs <value is set> <value is set>
service http 2 client-auth digest
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-13
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Monitoring Performance Statistics
service http 2 enabled false
service http 2 port 7550
service http 2 ssl cipher all-cipher-suites
service http 2 ssl client-auth none
service http 2 ssl enabled true
service http 2 ssl keystore server-certs <value is set> <value is set>
snmp-server community bacread ro
snmp-server community bacwrite rw
snmp-server contact <unknown>
snmp-server location <unknown>
snmp-server udp-port 8001
tacacs-server retries 2
tacacs-server timeout 5
Note
Monitoring Performance Statistics
Cisco BAC provides a rich set of statistics to aid in troubleshooting system performance. The statistics
are available across different major components, including the RDU, the Provisioning API Command
Engine, and device operations.
You can enable the collection of performance statistics from the administrator user interface or from the
DPE CLI.
•
To enable or disable performance statistics on the RDU, from the user interface, choose
Configuration > Defaults > System Defaults.
–
–
To enable this feature, against Performance Statistics Collection, click the Enabled radio
button.
To disable this feature, against Performance Statistics Collection, click the Disabled radio
button.
•
To enable or disable performance statistics on the DPE, from the DPE CLI in the enabled mode,
enter debug dpe statistics. To disable performance statistics from the CLI, use the no debug dpe
statistics command.
Note
Before using any debug command, ensure that DPE debugging is enabled by running the
After you enable the performance statistics feature, you can choose to view performance statistics from
the perfstat.log file or analyze the data by using the runStatAnalyzer.sh tool.
You can also view CWMP statistics specifically by using the administrator user interface. Choose
Servers > DPEs > Manage Device Provisioning Page > View Device Provisioning Engines Details.
For details on performance statistics collection, see:
•
•
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-14
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Monitoring Performance Statistics
Understanding perfstat.log
You can monitor performance statistics by using the data recorded in the perfstat.log file, in which
statistics data is logged at specific intervals; this time interval is 5 minutes. The perfstat.log file resides
in separate directories for the RDU (<BPR_DATA>/rdu/logs/statistics) and the DPE
(<BPR_DATA>/dpe/logs/statistics).
Each perfstat.log file stores data for a minimum of one day and a maximum of 30 days. Since you can
turn on and turn off the performance statistics feature, the logs may not represent data for consecutive
days.
The perfstat.log file is renamed every day by using the perfstat.N.log format, where N is any value
between 1 and 100. For example, perfstat.100.log will be the oldest log while perfstat.1.log will be the
most recent renamed perfstat.log file.
Note
The data is stored in comma-separated vector format. The format of each statistic is
yyyymmdd:hh:mm, component, interval-in-milliseconds, stat1-tag, stat1-value, stat2-tag,
stat2-value, … Stat1-tag and stat1-value specify the tag ID and the value of each statistic,
respectively.
Using runStatAnalyzer.sh
You can use Cisco BAC to analyze and provide a summary of performance statistics by using the
runStatAnalyzer.sh tool. To analyze collected performance statistics, run the runStatAnalyzer.sh tool
from the:
•
•
<BPR_HOME>/rdu/bin directory for the RDU.
<BPR_HOME>/dpe/bin directory for the DPE.
Syntax Description
# runStatAnalyzer.sh [-d perfdata-dir] [-s start-time] [-e end-time] [-c component]
[-f output-format] [-help] [-help components] [-help statistics [component]]
•
perfdata-dir—Specifies the directory from which performance statistics are analyzed. This is the
perfstatN.dat file located in the following default directories:
–
–
<BPR_HOME>/rdu/logs/statistics for the RDU
<BPR_HOME>/dpe/logs/statistics for the DPE
•
•
start-time—Specifies the time from which collected data is to be analyzed. By default, all collected
statistics are reported. Use this time format to specify start-time: yyyy-mm-dd:hh:mm.
end-time—Specifies the time until which data collected data is to be analyzed. By default, all
collected statistics are reported. Use this time format to specify end-time: yyyy-mm-dd:hh:mm.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-15
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Monitoring Performance Statistics
•
component—Specifies the Cisco BAC component for which you want to analyze statistics. You can
choose to specify all components (by using the all option) or specify from the following list of
supported components:
Applicable at
Component Option
pace
Description
RDU
P
DPE
Provisioning API Command Engine
Regional Distribution Unit
Extensions
rdu
P
ext
P
cwmp
CWMP Service
P
P
P
P
P
httpfile
HTTP File Service
proxyreq
leasequery
Authservice
cmhscr
Proxy Request Operations
Lease Query
P
P
AUTH service
CMHS Connection Request
Scriptable Extension
Multi-Instance Object Processing
scriptableExt
moip
P
P
Note
By default, statistics are analyzed for all components.
•
output-format—Specifies the format of the output you want, which could be:
–
summary—Provides output of the transaction rate summary. This is the default option.
Note
The summarized transaction rate is calculated based on the 5-minute interval data recorded
in perfstat.log.
–
log—Provides output similar to a log message.
•
•
-help—Provides usage information on the runStatAnalyzer.sh tool.
-help components—Provides information on the Cisco BAC component for which you can analyze
statistics.
•
-help statistics component—Provides information on the statistics that each Cisco BAC component
returns. You can choose to view help for all components (by using the all option) or for individual
components: pace, rdu, ext, cwmp, httpfile, proxyreq.
Example 11-3 Log Output Through runStatAnalyzer.sh
# runStatAnalyzer.sh -s 2006-04-11:12:59 -e 2006-04-11:13:09 -c pace -f log
2006-04-11:12:59 PACE statistics last 5 minutes- In Queue 0; Dropped 0; Dropped-Full Queue
0; Batches Received 0; Internal Batches Received 0; Succeed 0; Failed 0; Processed 0;
Processing avgTime 0 msec; Batch maxTime 0 msec; In Queue maxTime 0 msec; Processing
maxTime 0 msec; CRS Completed 0
2006-04-11:13:04 PACE statistics last 5 minutes- In Queue 0; Dropped 0; Dropped-Full Queue
0; Batches Received 0; Internal Batches Received 0; Succeed 0; Failed 0; Processed 0;
Processing avgTime 0 msec; Batch maxTime 0 msec; In Queue maxTime 0 msec; Processing
maxTime 0 msec; CRS Completed 0
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-16
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Monitoring STUN Statistics
2006-04-11:13:09 PACE statistics last 5 minutes- In Queue 0; Dropped 0; Dropped-Full Queue
0; Batches Received 0; Internal Batches Received 0; Succeed 0; Failed 0; Processed 0;
Processing avgTime 0 msec; Batch maxTime 0 msec; In Queue maxTime 0 msec; Processing
maxTime 0 msec; CRS Completed 0
Note
The number of statistics available varies on the component specified.
Example 11-4 Summary Output Through runStatAnalyzer.sh
# runStatAnalyzer.sh -s 2006-04-11:12:59 -e 2006-04-11:13:29 -c pace -f summary
2006-04-11:13:04 PACE statistics last 5 minutes- In Queue 0; Dropped 0; Dropped-Full Queue
0; Batches Received 0; Internal Batches Received 0; Succeed 0; Failed 0; Processed 0;
Processing avgTime 0 msec; Batch maxTime 0 msec; In Queue maxTime 0 msec; Processing
maxTime 0 msec; CRS Completed 0
2006-04-11:13:29 PACE statistics last 30 minutes- In Queue 0; Dropped 0; Dropped-Full
Queue 0; Batches Received 0; Internal Batches Received 0; Succeed 0; Failed 0; Processed
0; Processing avgTime 0 msec; Batch maxTime 0 msec; In Queue maxTime 0 msec; Processing
maxTime 0 msec; CRS Completed 0
Note
Summarized data is visible only if a complete set of data is available for the given interval. For example,
the summary output of a 30-minute summarized interval appears only if there is 30 minutes worth of
data. Based on the data available, the summarized time intervals are 5 minutes, 30 minutes, 60 minutes,
3 hours, 6 hours, 12 hours, 24 hours, 7 days, 14 days, 21 days, and 30 days.
Monitoring STUN Statistics
Cisco BAC STUN server provides a rich set of statistics to aid in troubleshooting system performance
and error conditions while communicating with the device. It also performs troubleshooting when
connection requests are received from RDU and forwarded to the device.
Understanding stunstatistics.log
You can monitor performance statistics by using the data recorded in the stunstatistics.log file, in which
statistics data is logged at specific intervals. By default, the time interval is set to 15 minutes.
You can configure the interval in stun.properties available under STUN_HOME/stun/conf directory. The
stunstatistics.log file resides in STUN_DATA/stun/logs/.
Example 11-5 Sample Logs Collected Through stunstatistics.log File
Number of Binding Request Received=40,
Number of Binding Response Sent=40,
Number of Binding Timeout Discovery Response Sent=0,
Number of Binding Update Received=60,
Number of Binding Update Authentication Succcess=25,
Number of Binding Update Authentication Failure (401-Unauthorized)=35,
Number of Binding Update Authentication Failure (420-Unknown Attribute)=0,
Number of Binding Update Authentication Failure (431-Integrity Check Failure)=0,
Number of Binding Update Authentication Failure (432-Missing Username)=0,
Number of Binding Update Authentication Failure (500-Server Error)=0,
Number of Dropped Requests (Network Failures)=0,
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-17
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Traffic Profiling
Number of UDP Connection Request Failure (Binding Mapping Not Found)=9,
Number of UDP Connection Request Failure (Shared Secret Not Configured)=0,
Number of UDP Connection Request Failure (Network Failures)=0,
Number of UDP Connection Request Sent=54,
Number of CXF Connection Request Received=27,
Number of CXF Connection Response Success=18,
Number of CXF Service Authentication Failure (Unauthorized)=0,
Number of CXF Service Authentication Failure (Protocol Header Not Found)=0
STUN Binding Information
The STUN server stores the binding information from the device in its cache. You can view the binding
information at any point of time by running the utility dumpStunBindingInfo.sh available under
STUN_HOME/stun/internal/bin directory.
Using dumpStunBindingInfo.sh
To display the collected STUN binding information, run the dumpStunBindingInfo.sh tool from the
STUN_HOME/stun/internal/bin directory.
Syntax Description
dumpStunBindingInfo.sh[-?] [-file]
where:
•
•
-?—Prints this usage message
-file—Bindinginfo file to be parsed
Here binding info file is available under the STUN_DATA/stun/ directory.
Traffic Profiling
Cisco BAC provides details about the traffic between the CPE and the DPE to provide visibility into
flows that may be causing issues. This traffic profiling provides statistics on the following:
•
•
•
•
•
Number of CWMP sessions handled
Number of devices rejected
Number of HTTP file requests handled
Home Provisioning Group redirection status
Traffic caused by chatty clients
The periodic statistics provides details, including the name of each Remote Procedure Call (RPC) and
the specific types of Inform messages. The following RPC methods are monitored and reported:
•
•
•
•
•
GetRPCMethods
SetParameterValues
GetParameterValues
SetParameterAttributes
GetParameterAttributes
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-18
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Traffic Profiling
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
AddObject
DeleteObject
Download
Reboot
Inform
TransferComplete
AutonomousTransferComplete
GetQueuedTransfers
ScheduleInform
SetVouchers
GetOptions
Upload
FactoryReset
GetAllQueuedTransfers
Kicked
RequestDownload
To enable or disable traffic statistics on the RDU, from the user interface, choose Configuration >
Defaults > System Defaults.
•
•
To enable this feature, against Performance Statistics Collection, click the Enabled radio button.
To disable this feature, against Performance Statistics Collection, click the Disabled radio button.
To enable or disable traffic statistics on the DPE, from the DPE CLI in the enabled mode, enter debug
dpe statistics. To disable traffic profiling from the CLI, use the no debug dpe statistics command.
After you enable the traffic statistics feature, you can view the traffic statistics from the perfstat.log file
or analyze the data by using the runStatAnalyzer.sh tool.
You can view the traffic statistics by using the administrator user interface. Choose Servers > DPEs >
Manage Device Provisioning Page > View Device Provisioning Engines Details.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-19
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 11 Monitoring Cisco Broadband Access Center
Traffic Profiling
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
11-20
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
12
Configuring CWMP Service
This chapter describes how to configure the CWMP service in Cisco Broadband Access Center (BAC).
This chapter includes the following sections:
•
•
•
CWMP Service Configuration
CWMP is a specification of a set of remote procedure calls (RPCs), for example, GetParameterValues,
SetParameterValues, and so on. These RPCs define the generic mechanism by which Cisco BAC reads
or writes parameters to customer premises equipment (CPE) in order to manage it. These parameters
include:
•
•
•
Device configuration information
Status information
Performance statistics
You can enable or disable CWMP features on the DPE by using the DPE CLI.
Among the features that you can configure on the DPE are:
•
•
•
•
•
•
•
•
HTTP-based Basic or Digest authentication
Certificate-based authentication
HTTP over SSL/TLS service settings
Handling of unknown devices
Debugging settings
Session management settings
CWMP service settings
HTTP file service settings
For information on how to configure these properties, see the Cisco Broadband Access Center 3.8 DPE
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Connection Request Service
Configuring Service Ports on the DPE
You can configure the ports on which the CWMP services communicate with a device. You can
independently configure each instance of the CWMP services—the CWMP RPC service and the HTTP
file service—to suit your requirements. Table 12-1 describes how you configure ports for each service.
Table 12-1
Configuring Service Ports
Command
Syntax Description
Default
Configuring the CWMP RPC Service
service cwmp num port port
•
•
num—Identifies the CWMP
service, which could be 1 or 2. is configured to listen on:
By default, the CWMP service
port—Identifies the port
number that the service should
use.
•
•
Port 7547 for service 1.
Port 7548 for service 2.
Example:
dpe# service http 1 port 7547
% OK (Requires DPE restart "# dpe reload")
Configuring the HTTP File Service
service http num port port
•
•
num—Identifies the HTTP file By default, the HTTP file
service, which could be 1 or 2. service is configured to listen
on:
port—Identifies the port
number that the service should
use.
•
•
Port 7549 for service 1.
Port 7550 for service 2.
Example:
dpe# service http 1 port 7549
% OK (Requires DPE restart "# dpe reload")
Connection Request Service
Connection requests instruct the device to establish a CWMP session with the DPE. You can use the
Cisco BAC connection request service to activate a configuration on a device, execute firmware changes
to the device, or execute immediate operations upon the device.
Initiated by the DPE, connection requests are the only method available to the DPE to establish a session
with a device. Once a session is established, the device or the DPE may perform any RPCs, including
device operations and configuration changes.
Figure 12-1 describes the flow of a connection request in Cisco BAC. The RDU delegates the connection
request to the best available DPE in the provisioning group of the device. Once the connection request
ends, the DPE notifies the RDU of the result.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Connection Request Service
Figure 12-1
Connection Request in BAC
RDU
DPE
Device
Perform Connection Request
HTTP GET (no Auth)
HTTP CHALLENGE
HTTP GET (with Auth)
HTTP OK
Successful
Inform
Configuring Connection Request Options
You can use Cisco BAC to control the behavior of connection requests by configuring your preferences
for:
•
•
•
Note
You can set your preferences on the device object or in its property hierarchy.
Configuring Authentication
Two properties that you set on the device object in the RDU affect authentication. They are:
•
On the API:
–
–
IPDeviceKeys.CONNECTION_REQUEST_USERNAME
IPDeviceKeys.CONNECTION_REQUEST_PASSWORD
•
On the administrator user interface:
–
–
Devices > Modify Device > Connection Request User Name field
Devices > Modify Device > Connection Request Password field
You can also set the connection request username and password while adding a device on the
Add Device page, and change the username and password in the Modify Device page.
Both properties control the connection request username and password that are used in DPE-CPE
authentication. This username and password differ from the username and password used to authenticate
CWMP sessions between the DPE and a device. These properties are for a single device; thus, they can
be set only on the device object.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Connection Request Service
If you do not specify a Connection Request password, a Connection Request password is automatically
generated for the device using the connection request master secret. If you do not specify the Connection
Request username, the device ID is used.
It is up to the device to issue an authentication challenge during connection request authentication, as
illustrated in Figure 12-1. The DPE expects to be challenged with HTTP Digest authentication. There is
no DPE configuration for connection request handling.
The API properties do not automatically update device parameters. You must preconfigure the
corresponding values on the device or configure the values using a configuration template which can
reference these properties.
Autogenerating Connection Request Passwords
In this release of Cisco BAC, Connection Request passwords can be autogenerated or specified by the
Operational Support System (OSS).
Cisco BAC Generated Passwords:
In this approach, Cisco BAC generates a unique Connection Request password for each CWMP device.
The password is encrypted using the connection request master secret and forwarded to the DPEs. You
specify the connection request master secret in the CWMP Defaults page in the administrator user
The DPEs derive the device passwords by using the hash message authentication code. If the DPE fails
to authenticate using the current password, Cisco BAC attempts to authenticate by using the old
password derived from the earlier master secret. Cisco BAC stores the last 15 passwords, by default, and
attempts authentication by using each of these passwords in reverse order, until authentication succeeds.
To use autogenerated passwords, you have to specify the value, __AUTO_GENERATED__ for
Connection Request password in the configuration template.
When the RDU attempts a connection request to a device:
•
If /IPDevice/connectionRequestPassword property is not specified in the device record, the RDU
assumes that an autogenerated password is used for that device.
•
If /IPDevice/connectionRequestUsername property is not specified in the device record, the RDU
uses the device ID as the user name for that device.
OSS Provided Passwords:
In this approach, you can provide passwords that may or may not be unique to each device. The
Connection Request password is set on the /IPDevice/connectionRequestPassword property in the
device record. When the password is set on the property, the following changes are triggered in the
system:
•
This RDU-provided password is used as the Connection Request password, instead of the
autogenerated password at the DPE. As a rule, the password set on the device takes precedence over
the autogenerated password.
•
The hash key for the device reverts to the legacy format (DeviceConfHash).
You can also set the Connection Request username and password in the device configuration templates.
•
If the username and password are set on both the device record and the configuration template, the
username and password set in the device record are used.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Connection Request Service
•
If the username and password are present only on the configuration template (and not in the device
record), this password is used instead of the auto-generated password.
Configuring Connection Request Methods
You can specify the method in which Cisco BAC attempts to perform a connection request by using the
provisioning API or the administrator user interface. The selected method dictates how Cisco BAC
determines the connection request URL to be used to contact the device.
The API property IPDeviceKeys.CONNECTION_REQUEST_METHODspecifies the connection request method
(subsequent descriptions provide the details of each method).
Note
You can specify this property anywhere in the device hierarchy.
To configure the default connection request method by using the administrator user interface, choose
Configuration > Default > CWMP Defaults, and select an option from the drop-down list.
Cisco BAC supports the following methods to configure a connection request:
•
•
•
•
•
•
Discovered
Using FQDN
Using IP
LeaseQuery
Annex G
Use CMHS
When selecting a connection request method, it is important to consider performance and manageability,
as each method provides different levels of both.
Discovered Connection Request
The Discovered method, during CPE interactions with the DPE, modifies the data synchronization
instruction to discover the device's connection request URL, which corresponds to the parameter
InternetGatewayDevice.ManagementServer.ConnectionRequestURL, whenever the DPE interacts with
the device. The RDU records any updates to this parameter value and uses it when making connection
requests.
Note
This value must be discovered before connection requests are attempted.
Because this parameter value changes each time the device’s WAN IP address changes and every update
has to be stored at the RDU, it is not the optimal method for connection requests.
Use FQDN Connection Request
The Use FQDN method uses the fully qualified domain name (FQDN) specified for the device at the
RDU to construct a connection request URL for the device. It uses the FQDN along with the values
specified in the following properties on the API:
• IPDeviceKeys.CONNECTION_REQUEST_PORT
• IPDeviceKeys.CONNECTION_REQUEST_PATH
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Connection Request Service
You can also specify these properties on the administrator user interface:
Step 1
Step 2
Choose Devices > Manage Devices.
Use one of these methods:
•
•
Add a device record. To do this, click the Add button. The Add Device page appears.
Search for a device record. To do this,
a. Specify a Search Type and enter values for the screen components that are unique to the search type
that you select.
A list of devices appears.
b. Click the Identifier link corresponding to the desired device.
The Modify Device page appears.
Step 3
From the Property Name drop-down list, select the /IPDevice/connectionRequestPort and
/IPDevice/connectionRequestPath properties, and enter appropriate values in the Property Value field.
Note
The API constants for /IPDevice/connectionRequestPort and /IPDevice/connectionRequestPath
are IPDeviceKeys.CONNECTION_REQUEST_PORTand IPDeviceKeys.CONNECTION_REQUEST_PATH,
respectively.
Step 4
Note
Click Add.
You can specify the port and path properties anywhere in the property hierarchy.
Because the Use FQDN method relies on the DNS being updated with the device's correct IP address,
you do not need to update Cisco BAC whenever the device IP address changes. Subsequently, this option
is the most scalable one for connection requests.
Use IP Connection Request
The Use IP method discovers the device's WAN IP address by using the same mechanism as the
Discovered method. Then, it constructs a connection request URL for the device by using the values in
the following API properties:
• IPDeviceKeys.CONNECTION_REQUEST_PORT
• IPDeviceKeys.CONNECTION_REQUEST_PATH
You can also specify these properties on the administrator user interface:
Step 1
Step 2
Choose Devices > Manage Devices.
Use one of these methods:
•
•
Add a device record. To do this, click the Add button. The Add Device page appears.
Search for a device record. To do this,
a. Specify a Search Type and enter values for the screen components that are unique to the search type
that you select.
A list of devices appears.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Connection Request Service
b. Click the Identifier link corresponding to the desired device.
The Modify Device page appears.
Step 3
From the Property Name drop-down list, select the /IPDevice/connectionRequestPort and
/IPDevice/connectionRequestPath properties, and enter appropriate values in the Property Value field.
Note
The API constants for /IPDevice/connectionRequestPort and /IPDevice/connectionRequestPath
are IPDeviceKeys.CONNECTION_REQUEST_PORTand IPDeviceKeys.CONNECTION_REQUEST_PATH,
respectively.
Step 4
Click Add.
Because the Use IP method relies on the RDU having the device's WAN IP address, it requires the WAN
IP address to be discovered before connection requests are attempted. Also, because the device's WAN
IP address changes, the RDU must be updated with the new IP address. Subsequently, this option is not
the optimal method for connection requests.
Using LeaseQuery
The LeaseQuery method discovers the latest IPSec address of the HNB from Cisco Network Registrar
DHCP server. It first forms the Connection request URL by using the following API properties and then
sends it to HNB through SeGW (Security Gateway).
• IPDeviceKeys.CONNECTION_REQUEST_PORT
• IPDeviceKeys.CONNECTION_REQUEST_PATH
You can also specify these properties on the administrator user interface:
Step 1
Step 2
Choose Devices > Manage Devices.
Use one of these methods:
•
•
Add a device record. To do this, click Add. The Add Device page appears.
Search for a device record. To do this,
a. Specify a Search Type and enter values for the screen components that are unique to the search type
that you select. A list of devices appears.
b. Click the Identifier link corresponding to the desired device. The Modify Device page appears.
Step 3
From the Property Name drop-down list, select the /IPDevice/connectionRequestMethod,
/IPDevice/connectionRequestPort and /IPDevice/connectionRequestPath properties, and enter the
appropriate values in the Property Value field.
Note
The API constants for /IPDevice/connectionRequestMethod, /IPDevice/connectionRequestPort
and /IPDevice/connectionRequestPath are IPDeviceKeys.CONNECTION_REQUEST_METHOD,
IPDeviceKeys, CONNECTION_REQUEST_PORT, and IPDeviceKeys.CONNECTION_REQUEST_PATH,
respectively.
Step 4
Click Add.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Connection Request Service
Configuring STUN Parameters (Annex G)
Cisco BAC now includes the TR-069 Annex G support for remotely managing CPE devices which are
connected through a NAT gateway. Annex G uses a STUN server to identify a CPEs public IP address
and port details.
The STUN server also tracks all the changes being made to the CPEs. Annex G uses a UDP based
connection request mechanism defined in TR069 Annex G to allow Cisco BAC to initiate a session with
the CPEs.
Step 1
Step 2
Choose Devices > Manage Devices.
Use one of these methods:
•
Add a device record. To do this:
Click the Add button. The Add Device page appears.
Search for a device record. To do this,
•
a. Specify a Search Type and enter values for the screen components that are unique to the search type
that you select.
A list of devices appears.
b. Click the Identifier link corresponding to the desired device.
The Modify Device page appears.
Step 3
From the Property Name drop-down list, select the /IPDevice/connectionRequestPort and
/IPDevice/connectionRequestPathproperties, and enter appropriate values in the Property Value field.
Configure the following properties at the property hierarchy level:
• /IPDevice/cr/stunEnable
• /IPDevice/cr/stunServerAddress
• /IPDevice/cr/stunServerPort
• /IPDevice/cr/stunServerHttpPort
• /IPDevice/cr/stunServerHttpUsername
• /IPDevice/cr/stunServerHttpPassword
The API constants for /IPDevice/cr/stunEnable, /IPDevice/cr/stunServerAddress,
/IPDevice/cr/stunServerHttpPort, /IPDevice/cr/stunServerPort, /IPDevice/cr/stunServerHttpUsername,
and /IPDevice/cr/stunServerHttpPassword are:
IPDeviceKeys.STUN_ENABLED, IPDeviceKeys.STUN_SERVER_ADDRESS,
IPDeviceKeys.STUN_SERVER_PORT, IPDeviceKeys.STUN_SERVER_HTTP_PORT,
IPDeviceKeys.STUN_HTTP_USER_NAME, and IPDeviceKeys.STUN_HTTP_PASSWORD, respectively.
Step 4
Click Add.
You can specify the port and path properties anywhere in the property hierarchy.
Configuring CMHS Connection Request (Use CMHS)
This method allows Cisco BAC to send connection request to CPE devices using the CMHS server, using
BAC NB API Interfaces or BAC Admin UI.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-8
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Connection Request Service
When RDU receives the connection request message, it sends the message to the CMHS server that is
configured in the BAC properties hierarchy. The CMHS NB API client contacts the CMHS server that
the DLC is most likely be connected to.
Step 1
Step 2
Choose Devices > Manage Devices.
Use one of these methods:
•
Add a device record. To do this:
Click Add. The Add Device page appears.
Search for a device record. To do this:
•
a. Specify a Search Type and enter values for the screen components that are unique to the search type
that you select.
A list of devices appears.
b. Click the Identifier link corresponding to the desired device.
The Modify Device page appears.
Step 3
From the Property Name drop-down list, select the /IPDevice/connectionRequestMethod property, and
select Use CMHS from the Property Value drop-down list.
Step 4
Step 5
Click Add.
new group type.
Step 6
Step 7
Add a group with type CMHS for each CMHS server which needs to be considered to send CMHS
Configure the following properties with CMHS server details, host, http port, user name and password,
in the BAC properties hierarchy at group level.
• /IPDevice/cr/cmhsNbApiAddress
• /IPDevice/cr/cmhsNbApiPort
• /IPDevice/cr/cmhsNbApiUsername
• /IPDevice/cr/cmhsNbApiPassword
Note
CMHS groups must not be used for any other purpose other than configuring CMHS server
details for CMHS connection requests.
If you do not specify any values for the properties /IPDevice/cr/cmhsNbApiUsername and
/IPDevice/cr/cmhsNbApiPassword, the default values are taken from cmhs.properties file available in
the BAC_HOME/rdu/conf/ folder. For the property/IPDevice/cr/cmhsNbApiPort, the default value is
80.
Note
You can use the API IPDevice.changeNodeProperties(), if want to change any of the BAC
properties for the CMHS group.
Step 8
Configure CMHS Server List Property, /IPDevice/cr/cmhsServerListPropertyName with a
deployment specific Custom Property name. It needs to be set on BAC property hierarchy using BAC
NB API or UI.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-9
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Connection Request Service
This Custom Property is not pre-defined by BAC. It needs to be created and populated with comma
separated values of CMHS groups names. These values need to be considered while sending CMHS
connection request.
Note
The API constants for /IPDevice/connectionRequestMethod, is
IPDeviceKeys.CONNECTION_REQUEST_METHOD.
Configuring External URLs on DPE
The ACS URL is the configured URL of the Cisco BAC server associated with each provisioning group.
The devices use this URL to contact the DPEs in a given provisioning group. The RDU uses this URL
to perform various operations, such as redirecting the devices to the home provisioning group.
The ACS URL that the DPE issues, depends on the URL that is configured for each of the CWMP
services. You can use the following commands to configure the external URL for each service running
on the DPE:
Command
Description
service cwmp 1 external-url url
Configures the DPE to represent externally the
specified external URL as the URL of the CWMP
service 1.
service cwmp 2 external-url url
service http 1 external-url url
service http 2 external-urlurl
Configures the DPE to represent externally the
specified external URL as the URL of the CWMP
service 2.
Configures the DPE to represent externally the
specified external URL as the URL of the HTTP
service 1.
Configures the DPE to represent externally the
specified external URL as the URL of the HTTP
service 2.
For specific information about using these commands, see the Cisco Broadband Access Center 3.8
For CWMP services, the URL of the CWMP service that is first enabled on the DPE is sent to the RDU
as the discovered ACS URL.
Disabling Connection Requests
You can choose to disable the connection request service. This option is useful if there is no STUN server
and a device is behind NAT setup. Connection requests are not possible in such scenarios.
Note
You can use ConnectionRequest via API device operations even if you disable connection requests.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-10
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Connection Request Service
Configuring Reachability
Reachability plays an important role in configuring connection requests. In earlier versions of Cisco
BAC, connection requests were refused if a device's reported IP address and its source IP address did not
match. This was because this implies that the device used the NAT standard, and therefore, configuration
requests did not normally succeed. You could change this behavior from the administrator user interface
or the API.
Cisco BAC supports a new standalone STUN server to handle the UDP connection requests feature. A
UDP based connection request mechanism defined in TR069 Annex G, allows Cisco BAC to initiate a
session with a CPE that is operating behind a NAT gateway. STUN Service can be run on Solaris or
Linux.
By using the API, set the property IPDeviceKeys.FORCE_ROUTABLE_IP_ADDRESSto true to allow TCP
based connection requests regardless of a mismatch in the device source IP address.
From the administrator user interface:
Step 1
Step 2
Choose Devices > Manage Devices.
Use one of these methods:
•
Add a device record. To do this:
Click the Add button. The Add Device page appears.
Search for a device record. To do this,
•
a. Specify a Search Type and enter values for the screen components that are unique to the search type
that you select.
A list of devices appears.
b. Click the Identifier link corresponding to the desired device.
The Modify Device page appears.
Step 3
Step 4
From the Property Value drop-down list, select /IPDevice/forceRouteIPAddress, and set a property
value.
The API constant for /IPDevice/forceRouteIPAddress is IPDeviceKeys.FORCE_ROUTABLE_IP_ADDRESS.
Click Add.
Note
You can specify this property anywhere on the device's hierarchy.
Discovering Data from Devices
This section describes the Discovery of Data feature, which you use to retrieve a predefined set of
parameters from the device, and store these parameters in the RDU for future use.
You can use this discovered data to manage device firmware and device configurations by providing
some key attributes of the device and its current configuration. Discovered parameters are updated at the
RDU any time their values change on the device.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-11
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Connection Request Service
You can configure data discovery at the RDU. The RDU forwards discovery policy instructions and the
values of parameters, discovered for each device during the previous discovery process, to the
appropriate DPEs. During interactions with the device, the DPE consults the discovery policy
instructions specific to the device to determine what parameters need to be discovered.
After parameter values are discovered, existing device parameters are compared with those already
stored for the device. If the values have changed or are being obtained for the first time, this data is
updated at the RDU. If the RDU is not available to receive the update, the newly discovered data is
dropped, and the entire process of data discovery is initiated the next time the device connects with the
DPE.
Discovered parameters are stored on device records and you can view them by using the administrator
user interface or obtain them through the API IPDevice.getDetails()call. IPDevice-getDetails()
API also retrieves the device data along with the device property hierarchy. To view discovered
parameters using the user interface, access the Manage Devices page under the Devices tab on the
primary navigation bar.
Locate the device by using the search options, and click the View Details icon ( ) corresponding to the
device. The Device Details page appears, displaying details of the discovered parameters for the device.
Multi-instance object support is available in data discovery for preregistered and unknown devices. For
The following sections describe:
•
•
•
Configuring Data Discovery
Data discovery policy is configured using the RDU and includes parameters checked:
•
•
On every device contact.
Only upon a firmware upgrade.
While the discovery of data process executes every time a device establishes contact with the DPE, you
can configure validation of certain parameters to occur only if the device has reported a new firmware
version. This check eliminates the need to validate parameters whose values change only with a firmware
upgrade.
For example, the device model name does not change without a firmware upgrade; thus, you do not need
to check this parameter on the device unless the firmware has been upgraded.
Cisco BAC ships with a default configuration for data discovery. You can augment this default
configuration in two ways:
•
•
Add parameters to a custom list.
Change the default list. This option, however, is not recommended.
Configuring Parameters Checked on Every Contact
You can configure the default list of parameters discovered everytime the device connects with the DPE
by using the ServerDefaultsKeys.CWMP_DISCOVER_PARAMETERS property. You can add more parameters
to the default list by providing a comma-separated list of parameters as a value to the
IPDeviceKeys.CWMP_CUSTOM_DISCOVER_PARAMETERSproperty.
The default list includes:
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-12
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Connection Request Service
•
•
•
•
•
•
Inform.DeviceId.Manufacturer
Inform.DeviceId.ManufacturerOUI
Inform.DeviceId.ProductClass
InternetGatewayDevice.DeviceInfo.HardwareVersion
InternetGatewayDevice.DeviceInfo.SoftwareVersion
InternetGatewayDevice.ManagementServer.ParameterKey
For example:
IPDeviceKeys.CWMP_CUSTOM_DISCOVER_PARAMETERS= InternetGatewayDevice.ManagementServer.URL,
InternetGatewayDevice.ManagementServer.PeriodicInformEnable
Configuring Parameters Checked on Firmware Upgrade
You can configure the default list of parameters discovered after every firmware upgrade by using the
ServerDefaultsKeys.CWMP_FIRMWARE_CHANGED_CPE_PARAMETERSproperty. This default list includes the
InternetGatewayDevice.DeviceInfo.ModelName parameter.
To customize this list to include more parameters, use the
IPDeviceKeys.CWMP_CUSTOM_FIRMWARE_CHANGED_PARAMETERSproperty.
Troubleshooting Data Discovery
You can also troubleshoot data discovery from the DPE CLI by using any of the tasks described in
Table 12-2
Troubleshooting Discovery of Data from DPE
Task
Use ...
Description
dpe# log level 6-info
Enable info-level logging
Displays information messages
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-13
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Connection Request Service
Table 12-2
Troubleshooting Discovery of Data from DPE (continued)
Task
Use ...
Description
dpe# show log
View device log
Displays recent DPE log entries.
Displays the last 100 lines of the
DPE log.
dpe# show log last 100
dpe# show log run
Displays the running DPE log.
Note
You can use any of the three
listed commands.
Example
The output of the show log run command has been shortened for
demonstration purposes.
dpe# show log run
% Press <enter> to stop.
2006 08 04 00:47:01 EDT: %BAC-DPE-6-0104: Obtained configuration
for device [0014BF-CJJ005B00009] from RDU.
2006 08 04 00:47:21 EDT: %BAC-CWMP-6-5129: Device
[0014BF-CJJ005B00009]. Source IP [10.86.147.149]. Retrieving [1]
discovered CPE parameters.
2006 08 04 00:47:21 EDT: %BAC-CWMP-6-5107: Device
[0014BF-CJJ005B00009]. Source IP [10.86.147.149]. Sent
[GetParameterValues] message.
2006 08 04 00:47:21 EDT: %BAC-CWMP-6-5106: Device
[0014BF-CJJ005B00009]. Source IP [10.86.147.149]. Received
[GetParameterValuesResponse] message.
2006 08 04 00:47:21 EDT: %BAC-CWMP-6-5120: Device
[0014BF-CJJ005B00009]. Source IP [10.86.147.149]. New data
discovered from CPE. Queued update of [7] parameters to RDU.
Note
Discovery of data is successful if the output of the show log
commands is similar to the sample output featured here.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-14
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Connection Request Service
Table 12-2
Troubleshooting Discovery of Data from DPE (continued)
Task
Use ...
Description
dpe# debug on
Enable debugging
Enables debug logging of the data
synchronization process for the
CWMP service
dpe# debug service cwmp num
data-sync
num—Specifies the instance of the
CWMP service, which could be 1 or 2.
dpe# show device-config device-id
View data discovery
configuration for a
specific device
Displays the device configuration
cached at the DPE.
device-id—Specifies the ID of the
device.
For specific information on using these commands, see the Cisco Broadband Access Center 3.8 DPE
Note
You can use the provisioning API to execute many of the operations that are possible from the
administrator user interface.
Automatic IMEI Update
Cisco BAC now provides the capability to discover the International Mobile Equipment Identity (IMEI)
number that is unique to every device.
After the IMEI is discovered, it is stored on Hostname field in the device record in the RDU and is used
as the secondary Device ID. In the Admin GUI, the Hostname field is available in the Device Details
page. The auto-discover IMEI feature functions in the same way for both known and unknown devices.
To enable IMEI update:
Step 1
Step 2
Configure BAC property /IPDevice/custom/discover/parameterswith CPE IMEI parameter name.
Configure BAC IMEI update property /IPDevice/secondary-deviceID/cpe-param, also called as
Secondary Device ID CPE Parameter field with CPE IMEI parameter name.
You can set the IMEI update property /IPDevice/secondary-deviceID/cpe-paramproperty in Cisco
BAC property hierarchy through Class of Service page. This property is listed under the Property Name
drop-down list.
Step 3
Configure BAC property /IPDevice/properties/available/pgwith BAC IMEI update property name
/IPDevice/secondary-deviceID/cpe-param.
To disable IMEI update, Configure BAC IMEI update the /IPDevice/secondary-deviceID/cpe-param
property with value set to empty string or NOT_SUPPORTED. This disables IMEI update on hostname
field.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-15
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Provisioning Group Scalability and Failover
Provisioning Group Scalability and Failover
This section describes the scalability and failover features provided in this release of Cisco BAC.
Cisco BAC’s scalability and failover provide a high degree of availability to suit networks of virtually
any size, even those with millions of devices deployed. The product also provides such critical features
as DPE redundancy and failover protection.
Scalability in a Cisco BAC deployment is accomplished through provisioning groups, each of which is
a cluster of redundant DPE servers that communicate with a set of CPE. Provisioning groups enhance
the scalability of the Cisco BAC network by making each provisioning group responsible only for a
subset of devices.
This partitioning of devices can be along regional groupings or any other policy defined by the service
provider.
To scale a deployment, the administrator can:
•
•
•
Upgrade existing DPE server hardware.
Add DPE servers to a provisioning group.
Add provisioning groups and redistribute devices among them.
Cisco BAC supports explicit assignment and automatic membership of devices to provisioning groups.
Redundancy in Cisco BAC
Redundancy helps to ensure:
•
•
High availability for your network applications.
Users do not experience long network delays or black holes due to a single point of failure.
Cisco BAC supports local as well as regional server redundancy.
Local Redundancy
The Cisco BAC provisioning group is a cluster of redundant DPE servers that communicate with a set
of devices. A single URL identifies each provisioning group.
You can configure local redundancy by using any software or hardware that provides load-balancing
features, such as the Cisco Application Control Engine (ACE) 4710.
Regional Redundancy
Regional redundancy ensures that DPEs in a different location temporarily process CPE requests in case
of regional failure. The simplest way of facilitating this deployment is to set up DPEs within a
provisioning group in different geographic locations. In such a setup, CPE requests are serviced by DPEs
located in different regions, providing regional failover within the confines of the provisioning group.
In some deployments, however, you may require that CPE requests be processed by servers in one
location and fail over to DPEs in another location only in case of failure. In such a scenario, you can also
locate DPEs for a provisioning group in different regions yet configure the network such that, under
normal conditions, CPE requests are directed only to a subset of the DPEs in a particular region.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-16
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Provisioning Group Scalability and Failover
Typically, you can configure regional redundancy by using DNS techniques. To configure the network
for regional redundancy, ensure that the Cisco BAC hostname of a given provisioning name normally
resolves to IP address(es) representing one set of DPEs.
However, when none of the DPE servers in that set responds to keepalives, such as ICMP, HTTP GET,
or a TCP handshake, the DNS server should resolve the Cisco BAC hostname to the IP address(es) of
the DPEs from a second set. CPE requests are then directed to a different set of DPEs.
Since DPEs in both sets belong to the same provisioning group, the new DPEs are ready to respond to
requests. Subsequent DNS lookup requests fall back to the primary set of DPEs as soon as they become
available.
DPE Load-Balancing
Cisco BAC supports the following mechanisms for DPE redundancy and load-balancing:
•
•
Using DNS Round Robin
In using the DNS round-robin mechanism, the DNS server shuffles the list of DPE IPs when resolving
the autoconfiguration server (ACS) hostname for the device. The device then takes the first IP address
in the list as the ACS hostname.
This option is not recommended if the service provider does not control DNS caching servers. Also, DNS
round-robinning performs less than ideally in a power outage scenario, when a large number of devices
may receive the same order IP address cached by the DNS server, thus impacting performance. To work
around this issue, Cisco recommends configuring a very short TTL of 1 second on the DNS server.
Using a Hardware Load Balancer
When a hardware load balancer is used, the ACS URL contains the IP address or is resolved by the DNS
server to a single IP address. All DPEs for a provisioning group are hidden behind a single virtual IP
address of the hardware load balancer, such as Cisco ACE 4710.
The ACE provides load balancing and SSL/TLS acceleration for TR-069 traffic between the CWMP
devices and the DPEs. You can configure the ACE to translate its virtual IP address to a specific DPE IP
address, based on a load-balancing algorithm. ACE performs a series of checks and calculations to
determine the DPE that can best service each device request according to the load-balancing algorithm.
ACE also provides stickiness that allows the same device to maintain multiple simultaneous or
subsequent connections with the same DPE for the duration of a session.
A redundant pair of load balancers can improve redundancy and may service more than one provisioning
group.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-17
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 12 Configuring CWMP Service
Provisioning Group Scalability and Failover
Adding DPE to a Provisioning Group
This section describes how to add a DPE to a new provisioning group. In adding a DPE to a provisioning
group, there are three possible options:
•
•
Adding a DPE to a provisioning group
Add a DPE to a provisioning group in a deployment that uses a hardware load balancer, such as
Cisco ACE 4710, between the device and the DPE. In this case, you must update the load balancer.
•
Adding a DPE to a provisioning group in a deployment in which a DNS server, using round robin,
resolves to multiple DPEs for a provisioning group.
To add a DPE to a provisioning group:
Step 1
Configure the DPE from the DPE CLI. Among the configurations you must perform are:
•
Specifying the provisioning group to which the DPE must belong. Enter:
dpe# dpe provisioning-group primary name
–
name—Identifies the assigned primary provisioning group.
•
Specifying the RDU to which the DPE connects. Enter:
dpe# dpe rdu-server {host | ip} port
–
–
–
host—Identifies the FQDN of the host on which the RDU is running.
ip—Identifies the IP address of the RDU.
port—Identifies the port number on which RDU is listening for DPE connections. By default,
this port number is 49187.
•
Configuring the FQDN for a specific interface. The provisioning FQDN is the FQDN that is given
to a device to contact the specific DPE interface. Enter:
dpe# interface ethernet {intf0 | intf1} provisioning fqdn fqdn
–
–
intf0 | intf1—Identifies the Ethernet interface.
fqdn—Identifies the FQDN that is set on the specified interface.
You must use the same FQDN for all DPEs in a given provisioning group. If DPEs are located
behind the load balancer, use the FQDN of the load balancer as the interface FQDN, and ensure
that it is the same for all DPEs which are part of the same load-balancing group.
You must also configure the CWMP service and the HTTP file service on one DPE to match the
configurations on other DPEs.
For more information on configuration options, see the Cisco Broadband Access Center 3.8 DPE CLI
Step 2
Start the DPE by using the dpe start command, and allow the DPE to synchronize and populate device
configuration instructions from the RDU.
Step 3
Step 4
Optionally, if you are using a load balancer, add the DPE address to the load balancer.
Optionally, if you are using the DNS round robin technique, add the DPE address to the DNS server.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
12-18
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
13
Configuring CWMP Service Security
This chapter describes security options for Cisco Broadband Access Center’s (BAC) CWMP services,
including authentication and encryption. It describes how to enable HTTP over SSL transport, called
SSL in this chapter, for the CWMP services and the HTTP file services on the DPE, and use the
certificate-management tool to create a certificate store on the DPE.
This chapter includes the following sections:
•
•
•
•
•
•
Overview
Cisco BAC supports secure provisioning of CWMP devices by using SSL, specifically SSL 3.0 and TLS
1.0, as defined in RFC 2246. It supports device authentication based on shared secrets with the DPE by
using Basic and Digest authentication as defined in RFC 2617.
Cisco BAC provides multiple services at the DPE: two instances of the CWMP service and two instances
of the HTTP file service. You enable and configure each service independently, with different security
options providing the flexibility of handling various devices differently on the same DPE.
Cisco BAC also provides secure device authentication by using unique or generic client certificates.
•
Generic—Enables device certificate authentication through SSL by using a generic certificate that
is common to all customer premises equipment (CPE) or a large subset of CPE. For example, all
VoIP devices in a given deployment may have the same generic certificate that the service provider
issues.
The client certificate is validated against a signing authority key, but does not establish identity of
a given device. The device identifier is formed by using the data provided using HTTP Basic or
Digest authentication; or by using the data in the CWMP Inform message.
•
Unique—Enables client certificate authentication through SSL by using the unique certificate that
each device provides. After the client certificate is validated by using the signing certificate
authority's public key, the device's unique identifier is formed by using the CN field of the client
certificate.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Key and Certificate Management in Cisco BAC
Cisco BAC supports a unique option of performing client-certificate authentication at a hardware load
balancer and SSL accelerator such as Cisco ACE 4710.
In this scenario, the ACE performs certificate validation, extracts information about the SSL session,
specifically client certificate fields, from the device certificate, and inserts that data into special HTTP
headers. Cisco BAC then retrieves the CN field from the ACE header ClientCert-Subject-CN to form the
unique device identifier.
Cisco BAC allows a mix of authentication options. For example, you can validate that the device has a
generic certificate by using SSL and then perform additional HTTP Basic or Digest authentication once
SSL connection is established.
Cisco BAC also provides an option of no-device authentication. This option is useful if the device is
authenticated downstream from the DPE and the identity that the device presents can be trusted. If the
Cisco BAC DPE is configured to perform no-authentication, it extracts the device identity from the
Inform message and trusts it.
You can encrypt traffic between the device and a DPE by using SSL. Cisco BAC supports a variety of
cipher suites, which determine the encryption algorithms to be used with the device and the encryption
key length. You can configure acceptable cipher suites on the DPE by using the CLI. Another option is
to terminate SSL at a hardware load balancer and accelerator for higher scalability.
Note
Use the DPE CLI to configure security options for the CWMP service and the HTTP file service. For
Key and Certificate Management in Cisco BAC
The DPE stores the certificates that the SSL protocol requires for authentication in the keystore. This
keystore is a database in the form of a file that contains private keys and their associated public key
X.509 certificates.
There are two keystores on the DPE server. The keystores are the cacerts keystore and the server
certificates keystore.
•
The cacerts keystore contains public key certificates that the DPE trusts for authenticating devices’
client certificates.
•
The server certificates keystore contains the private key and the associated certificate chain for the
server-side certificate, which is used to authenticate the DPE to the devices.
All DPE SSL services share a single cacerts keystore. This keystore can contain any number of signing
authority certificates. The name of the cacerts keystore is fixed, and it must always reside in
BPR_HOME/jre/lib/security directory. Cisco BAC ships with a default cacerts keystore, which can be
manipulated by adding and removing signing authority certificates.
In contrast to the cacerts keystore, there can be multiple server certificate keystores and you can
configure each SSL service in the DPE to use a different server certificate keystore. Each server
certificate keystore should contain only one certificate chain. The server certificate keystores must reside
in the BPR_HOME/dpe/conf directory.
If SSL is being terminated on the DPEs, and the provisioning group contains multiple DPEs, then all the
DPEs must be configured with an identical keystore. An identical keystore is required since the same
fully qualified domain name (FQDN) URL of the autoconfiguration server (ACS) is used to resolve to
all DPEs in the provisioning group.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring SSL Service
As defined in the TR-069 specification, the ACS URL must be identical to the Common Name (CN)
value of the server certificate, which is imported into the keystore.
The DPE ships with a default sample server certificates keystore, called servercerts, which contains a
self-signed server certificate.
However, because a CWMP device does not normally trust self-signed certificates, you cannot use the
sample keystore to enable SSL for device provisioning. Instead, you must obtain a signed ACS certificate
with private key and use it to create a new server certificate keystore (see Configuring DPE Keystore by
acquiring and configuring an ACS certificate.
Configuring SSL Service
To enable SSL on Cisco BAC:
Step 1
Step 2
Create a server certificate keystore, which contains the private key and the associated ACS public key
certificate. This process also requires updating the cacerts keystore to load the public certificate of the
signing authority for the server certificate.
Optionally, if you would like to configure CPE authentication to use client certificates, update the cacerts
keystore with the public key of the CPE certificate authority root certificate, which can validate CPE
Step 3
Step 4
Configure the DPE to use the new server certificate keystore from the DPE CLI. For details, see
Enable SSL transport for the CWMP service or the HTTP file service by using the DPE CLI. For more
Note
To ensure that the changes you make to the keystore take effect, you must restart the DPE by
using the dpe reload command from the CLI, or the /etc/init.d/bprAgent restart dpe command
from the watchdog agent command line (see Using Cisco BAC Process Watchdog from the
Configuring DPE Keystore by Using the Keytool
You use Cisco BAC to configure the server certificate keystore and the cacerts keystore by using the
keytool utility. The keytool is a key and certificate-management utility, which you use to administer the
certificates on the DPE server.
The keytool utility resides in the Cisco BAC default installation directory, at
/opt/CSCObac/jre/bin/keytool. Run the keytool utility by using a secure connection to the DPE server.
Note
You must execute the keytool utility bundled with this Cisco BAC version, because the keystore file
format varies between keytool releases.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring SSL Service
To configure a server certificate:
Step 1
Step 2
Step 3
Step 4
Step 5
Create a new server keystore with a new private key by using keytool. See Generating Server Certificate
Generate a certificate-signing request (CSR). See Generating a Certificate-Signing Request, page 13-7,
for details.
Request a public certificate from the signing authority by using CSR. See Generating a
Certificate-Signing Request, page 13-7, for details.
Load the public key of the signing authority into the cacerts keystore. See Importing Signing Authority
Certificate into Cacerts Keystore, page 13-8, for details.
Load the signed server certificate into the server keystore. See Importing the Signed Certificate into
Server Certificate Keystore, page 13-9, for details.
Step 6
Step 7
Put the new keystore file in the DPE BPR_HOME/dpe/conf directory.
At the CLI, configure one of the DPE services to use the new keystore. See Configuring SSL Service,
page 13-3, for details
Step 8
Restart the DPE by using the dpe reload command from the CLI, or the /etc/init.d/bprAgent restart
Note
To enable the use of client certificates for device authentication, ensure that the public certificate of the
signing authority for device certificates is loaded into the cacerts keystore. Follow the procedure
Importing an Existing Signed Server Certificate
If you already have the signed server certificate and you want to load it into the keystore, you must know
the private key that is associated with the certificate. In this case, instead of following the procedure
described above, follow the steps outlined in this section. Use the PCKS#12 file format, which combines
both the private key and the signed certificate. You can load this file into a keystore by using the keystore
import-pkcs12 command.
To configure a server certificate with an existing signed server certificate:
Step 1
Load the existing private key and certificates into a DPE-compatible file, used in authenticating the DPE
to SSL clients, by using the keystore import-pkcs12 command.
When using this command, the syntax is:
keystore import-pkcs12 keystore-filename pkcs12-filename keystore-password key-password
export-password export-key-password
•
keystore-filename—Identifies the keystore file to create. If it already exists, it will be overwritten.
Note
Remember to specify the full path of the keystore file.
•
pkcs12-filename—Identifies the PKCS#12 file from which you intend to import the key
and certificate.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring SSL Service
•
•
•
•
keystore-password—Identifies the private key password and the keystore password that you used
when you created your keystore file. This password must be between 6 and 30 characters.
key-password—Identifies the password used to access keys within DPE keystore. This password
must be between 6 and 30 characters.
export-password—Identifies the password used to decrypt the key in the PKCS#12 file. The export
password must be between 6 and 30 characters.
export-key-password—Identifies the password used to access keys within the PKCS#12 keystore.
This password must be between 6 and 30 characters.
For example:
dpe# keystore import-pkcs12 example.keystore example.pkcs12 changeme changeme changeme
changeme
% Reading alias [1]
% Reading alias [1]: key with format [PKCS8] algorithm [RSA]
% Reading alias [1]: cert type [X.509]
% Created JKS keystore: example.keystore
% OK
Step 2
Step 3
Copy the new keystore file into the DPE BPR_HOME/dpe/conf directory.
At the CLI, configure one of the DPE services to use the new keystore. See Configuring SSL Service,
page 13-3, for details.
Step 4
Restart the DPE by using the dpe reload command from the CLI, or the /etc/init.d/bprAgent restart
Using the Keytool Commands
The keytool utility uses command arguments to configure a DPE keystore. Table 13-1 lists the keytool
commands and their descriptions.
Table 13-1
Keytool Commands
-alias alias
Identifies the identity assigned to a keystore entry, which stores the
certificate chain and the private key. Subsequent keytool commands
must use the same alias to refer to the entity.
-dname dname
Identifies the X.500 Distinguished Names used to identify entities,
such as those that the subject and the issuer named.
-file csr_file
-file cert_file
-keyalg keyalg
Identifies the CSR file to be exported.
Identifies the file from which the certificate is to be read.
Identifies the algorithm to be used for key-pair creation. The values
are DSA (default) and RSA.
-keysize keysize
-keypass keypass
-keystore keystore
Specifies a keysize, whose values must be in multiples of 64 bits.
Identifies the password assigned to a key pair.
Customizes the name and location of a keystore.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring SSL Service
Table 13-1
Keytool Commands (continued)
-noprompt
Specifies that no prompts are to be issued during an import
operation.
-provider provider_class_name Identifies the name of the cryptographic service provider's master
class file when the service provider is not listed in the security
properties file.
-rfc
Specifies that the output of the MD5 fingerprint of a certificate,
which appears in printable-encoding format.
-storepass storepass
-sigalg sigalg
Identifies the password assigned to a keystore.
Specifies the algorithm to be used to sign the certificate.
Identifies the type assigned to a keystore or an entry into a keystore.
-storetype storetype
-trustcacerts
Specifies that additional certificates are considered for the chain of
trust.
-v
Specifies that the output of the MD5 fingerprint of a certificate is
printed in human-readable format.
-validity valDays
Identifies an expiration period. The default is 90 days.
Note
For additional information on keytool and general certificate-management concepts, refer to Sun
Microsystems documentation.
Generating Server Certificate Keystore and Private Key for a New Certificate
The keytool -genkey command generates a key pair (a public key and an associated private key), and
wraps the public key into an X.509 self-signed certificate, which is stored as a single-element certificate
chain. This certificate chain and the private key are stored in a new keystore entry identified by alias.
Note
The name that you use for the alias is insignificant. Its purpose is to identify a key pair within the
keystore if you had multiple key pairs. In the context of Cisco BAC, you should have only one key pair
in the server certificate keystore, but you can have multiple keystores.
Example 13-1 Keytool -genkey
The following example uses train-1.keystore as the name of the keystore file. You can use any file name,
but using servercerts is not recommended because this conflicts with the sample keystore that Cisco
BAC provides.
dpe# ./keytool -keystore train-1.keystore -alias train-1 -genkey -keyalg RSA
Enter keystore password: changeme
What is your first and last name?
[Unknown]: train-1.bac.test
What is the name of your organizational unit?
[Unknown]: BAC Training
What is the name of your organization?
[Unknown]: Acme Device, Inc.
What is the name of your City or Locality?
[Unknown]: Boxborough
What is the name of your State or Province?
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring SSL Service
[Unknown]: MA
What is the two-letter country code for this unit?
[Unknown]: US
Is CN=train-1.bac.test, OU=BAC Training, O="Acme Device, Inc.", L=Boxborough, ST=MA, C=US
correct?
[no]: yes
Enter key password for <train-1>
(RETURN if same as keystore password):
In this example, train-1.bac.test goes into the CN field of the certificate and represents the FQDN that
the ACS URL contains. According to the TR-069 specification, the device validates the certificate
signature and ensures that the CN field in the certificate matches that of the URL it contacts.
Displaying Self-Signed Certificate
The keytool -list argument displays the contents of the keystore entry identified by alias. If you do not
specify an alias, the entire contents of the keystore appear.
If you combine -list with -v, the certificate chain associated with the alias appears. The following
keytool -list sample output displays the keystore containing a single self-signed certificate.
Example 13-2 Keytool -list
# ./keytool -keystore train-1.keystore -list -v
Enter keystore password: changeme
Keystore type: jks
Keystore provider: SUN
Your keystore contains 1 entry
Alias name: train-1
Creation date: Nov 8, 2005
Entry type: keyEntry
Certificate chain length: 1
Certificate[1]:
Owner: CN=train-1.bac.test, OU=BAC Training, O="Acme Device, Inc.", L=Boxborough, ST=MA,
C=US
Issuer: CN=train-1.bac.test, OU=BAC Training, O="Acme Device, Inc.", L=Boxborough, ST=MA,
C=US
Serial number: 43714f22
Valid from: Tue Nov 08 20:21:38 EST 2005 until: Mon Feb 06 20:21:38 EST 2006
Certificate fingerprints:
MD5: CF:D4:CB:D1:20:6F:8C:12:ED:EA:2F:21:53:57:E5:1D
SHA1: DD:AE:96:02:71:55:F8:1F:14:4F:D7:64:9C:FE:91:DE:65:C9:BB:49
Generating a Certificate-Signing Request
At this point in the procedure, the keystore contains a private key and a X.509 self-signed certificate. If
the DPE ACS tries to respond with this certificate to a device’s initial handshake, the device will reject
the certificate with a TLS alert bad CA, indicating that the certificate authority that the CPE trusted did
not sign the certificate. Therefore, the signing authority that the CPE trusts must sign the certificate.
Note
To support SSL, the device must have a list of preconfigured public certificates of signing authorities
that it trusts. One of the authorities that the device trusts must sign the ACS certificate.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring SSL Service
The keytool -certreq command parameter generates a certificate-signing request (CSR). This command
generates the CRS in the industry standard PKCS#10 format.
Example 13-3 Keytool -certreq
The following example uses a keystore with a preexisting self-signed certificate under alias train-1 to
generate a certificate-signing request and output the request into the train-1.csrfile.
dpe# ./keytool -keystore train-1.keystore -alias train-1 -certreq -file train-1.csr
Enter keystore password: changeme
The next step is to submit the CSR file to your signing authority. Your signing authority or your
administrator, who is in possession of the private key for the signing authority, will generate a signed
certificate based on this request. From the administrator, you must also obtain the public certificate of
the signing authority.
Verifying the Signed Certificate
After you have received the signed certificate, use the keytool -printcert command to verify if the
self-signed certificate is in the correct file format and uses the correct owner and issuer fields. The
command reads the certificate from the -file cert_file parameter, and prints its contents in a
human-readable format.
Example 13-4 Keytool -printcert
The train-1.crt file in this example identifies the signed certificate that the administrator provides.
dpe# ./keytool -printcert -file train-1.crt
Owner: CN=train-1.bac.test, OU=BAC Training, O="Acme Device, Inc.", ST=MA, C=US
Issuer: [email protected], CN=Acme Device Provisioning Root
Authority 1, OU=Acme Device Certificate Authority, O="Acme Device, Inc.", L=Irvine,
ST=California, C=US
Serial number: 1
Valid from: Tue Nov 08 12:40:28 EST 2005 until: Thu Nov 08 12:40:28 EST 2007
Certificate fingerprints:
MD5: 25:8E:98:C5:5C:23:5C:A0:4D:51:CF:2A:AA:2A:FC:42
SHA1: 05:C1:2D:C6:94:78:D1:40:88:6A:55:67:43:27:68:D3:AC:43:C6:A5
Note
The keytool can print X.509 v1, v2, and v3 certificates, and PKCS#7-formatted certificate chains
comprising certificates of that type. The data to be printed must be provided in binary-encoding format,
or in printable-encoding format (also known as Base64 encoding) as defined by the RFC 1421.
Importing Signing Authority Certificate into Cacerts Keystore
Before importing the certificate into the server certificate keystore, you must import the public certificate
of the signing authority into the cacerts keystore; because when a certificate is being imported into the
keystore, the keytool checks if a chain of trust can be established between the certificate and its signing
authority. If a chain of trust cannot be established, an error message appears.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-8
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring SSL Service
Note
The cacerts file bundled with Cisco BAC ships with several root certificate common third-party signing
authorities. You can manage the cacerts keystore by using the keytool utility. The default cacerts keystore
password is changeit. The cacerts database file resides in the BPR_HOME/jre/lib/security directory.
The cacerts keystore does not need to be copied anywhere. The DPE will use the new keystore as soon
as it is restarted.
Example 13-5 Keytool -import Signing Authority Certificate
# ./keytool -import -alias DeviceProvRoot -file rootCA4.crt -keystore
/opt/CSCObac/jre/lib/security/cacerts
Enter keystore password: changeit
Owner: [email protected], CN=Acme Device Provisioning Root
Authority 1, OU=Acme Device Certificate Authority, O="Acme Device, Inc.", L=Irvine,
ST=California, C=US
Issuer: [email protected], CN=Acme Device Provisioning Root
Authority 1, OU=Acme Device Certificate Authority, O="Acme Device, Inc.", L=Irvine,
ST=California, C=US
Serial number: 8bcbc07a0768c1eb78e6c5c93c0c2ff0
Valid from: Fri Jul 01 21:22:12 EDT 2005 until: Mon Jun 29 21:22:12 EDT 2015
Certificate fingerprints:
MD5: C4:D4:09:6A:60:34:A0:00:96:4F:4D:47:23:86:8C:FA
SHA1: B0:CC:6D:CD:BB:62:1B:A1:15:D3:2D:68:7E:D0:4A:0C:91:C2:A5:FD
Trust this certificate? [no]: yes
Certificate was added to keystore.
Note
The keytool can import X.509 v1, v2, and v3 certificates, and PKCS#7-formatted certificate chains
comprising certificates of that type. The data to be imported must be provided in binary-encoding
format, or in printable-encoding format (also known as Base64 encoding) as defined by the RFC 1421.
Importing the Signed Certificate into Server Certificate Keystore
Once you import the public certificate of the signing authority into the cacerts keystore, you must import
the signed server certificate into the DPE server certificate keystore. You will already have a keystore
with private key and corresponding self-signed certificate (public key).
By importing the certificate reply (signed certificate), the keystore is modified to associate the signed
certificate with the existing private key in the server certificate keystore.
When importing the certificate reply into the keystore, you must use the -trustcacerts flag with the
-import command for certificates in the cacerts file to be used to establish chains of trust with the
certificate reply in the subject’s keystore.
Example 13-6 Keytool -import (Signed Server Certificate)
dpe# ./keytool -import -trustcacerts -file train-1.crt -keystore train-1.keystore -alias
train-1
Enter key password: changeme2
Enter keystore password: changeme
Certificate reply was installed in keystore.
Certificate was added to keystore.
After you import the signed server certificate into the DPE server certificate keystore, use the keytool
-printcert command to verify the keystore contents, as outlined in Verifying the Signed Certificate,
page 13-8. The -printcert output should now show the issuer to be the signing certificate authority, and
that a chain of trust has been established using the signing authority with the root trusted certificate.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-9
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring SSL Service
Importing Certificates for Client Authentication
This step is required only if you have configured client authentication by using client certificates on the
DPE. If you have enabled client authentication by using client certificates, the cacerts keystore must
contain the public certificate of the signing authority that signed the CPE client certificates. This
certificate must be present to enable the DPE to validate certificates presented to it.
Example 13-7 Keytool -import (Signing Authority Certificate)
# ./keytool -import -alias DeviceClientRoot -file rootCA3.crt -keystore
/opt/CSCObac/jre/lib/security/cacerts
Enter keystore password: changeit
Owner: [email protected], CN=Acme Device Client Root Authority 1,
OU=Acme Device Certificate Authority, O=Acme Device LLC., L=Irvine, ST=California, C=US
Issuer: [email protected], CN=Acme Device Client Root Authority 1,
OU=Acme Device Certificate Authority, O=Acme Device LLC., L=Irvine, ST=California, C=US
Serial number: d07d8a7badba7cb6446998b1ea89879f
Valid from: Fri Jul 01 21:19:50 EDT 2005 until: Mon Jun 29 21:19:50 EDT 2015
Certificate fingerprints:
MD5: 40:B0:40:49:37:3A:51:1F:0D:78:B6:B3:E2:2C:1A:E8
SHA1: 96:F5:84:71:84:CC:0A:A2:1E:7B:44:A2:B6:F5:B7:3D:C4:9F:81:3B
Trust this certificate? [no]: yes
Certificate was added to keystore
Note
This procedure is exactly the same as the one described in Importing Signing Authority Certificate into
Cacerts Keystore, page 13-8. In both cases, you are loading the public certificate of the signing authority.
If the signing authority of the server certificates is the same as the signing authority for the device
certificates, you must add the certificate only once.
Providing the DPE with the service-provider keystore
Once you have a new service certificate keystore, which contains the signed public key certificate, you
must move the keystore file to the DPE. The file must be moved to the BPR_HOME/dpe/conf directory.
Example 13-8 Move Keystore to DPE Configuration Directory
# mv train-1.keystore /opt/CSCObac/dpe/conf
Once you complete this step, you can configure the DPE services to use the new keystore by using the
DPE CLI.
Note
You do not need to copy the cacerts keystore anywhere. The DPE will use the new keystore as soon as
it is restarted.
information on DPE configuration commands, see the Cisco Broadband Access Center 3.8 DPE CLI
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-10
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring Security for DPE Services
Configuring Security for DPE Services
This section describes how to configure authentication options and configure SSL on the DPE services.
The DPE supports running two CWMP and two HTTP file services concurrently. Each service can have
a different configuration of security options and runs on a different port. By default, only one CWMP
and one HTTP service are enabled, and they are configured without SSL. Two additional services are
configured for SSL, but are disabled by default.
Table 13-2 specifies the defaults settings for each instance of the CWMP service and the HTTP file
service:
Table 13-2
Default Settings for CWMP Technology
CWMP Service
HTTP File Service
File Service 1
Enabled
Service 1
Enabled
Digest
Service 2
Disabled
Digest
File Service 2
Disabled
Digest
Default Mode
Authentication
Port Number
SSL Protocol
Digest
7547
7548
7549
7550
Disabled
Enabled
Disabled
Enabled
Configuring SSL on a DPE
To enable SSL on any given service:
Step 1
Configure HTTP client authentication. You can enable authentication in the Basic or Digest mode, or
disable HTTP authentication.
Step 2
Step 3
Step 4
Step 5
Enable the SSL protocol for the service.
Configure the port through which the device contacts the service on the DPE.
Set the keystore filename, keystore password, and key password.
Configure client certificate authentication by using SSL. You can configure client authentication to use
generic or unique client certificates.
Step 6
Step 7
Step 8
Optionally, disable other instances of the CWMP service or HTTP file service.
Enable an instance of a service, which could be the CWMP service or the HTTP file service.
Restart the DPE by using the dpe reload command to ensure that the changes take effect.
Enabling SSL for the CWMP Service
The following example describes the commands that you use to enable SSL for an instance of the CWMP
service. In this example, double authentication is enabled for the SSL clients by using client certificates
and HTTP authentication in Basic mode.
dpe# service cwmp 2 client-auth basic
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-11
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring Security for DPE Services
% OK (Basic authentication was enabled. Digest authentication was disabled. Requires DPE
restart "> dpe reload")
dpe# service cwmp 2 port 7548
% OK (Requires DPE restart "> dpe reload")
dpe# service cwmp 2 ssl enable true
% OK (Requires DPE restart "> dpe reload")
dpe# service cwmp 2 ssl keystore train-1.keystore changeme changeme2
% OK (Requires DPE restart "> dpe reload")
dpe# service cwmp 2 ssl client-auth client-cert-unique
% OK (Requires DPE restart "> dpe reload")
dpe# service cwmp 1 enabled false
% OK (Requires DPE restart "> dpe reload")
dpe# service cwmp 2 enable true
% OK (Requires DPE restart "> dpe reload")
dpe# dpe reload
Process dpe has been restarted.
% OK
Note
This example configures SSL transport on CWMP instance 2. The example assumes that the
train-1.keystoreis preloaded with the signed public key certificate for the server and that the
keystore file was moved to the BPR_HOME/dpe/conf directory on the DPE.
Enabling SSL for the HTTP File Service
The following example describes the commands that you use to enable the SSL protocol for an instance
of the HTTP file service. In this example, client authentication is disabled; thus allowing access without
an authentication challenge.
dpe# service http 2 client-auth none
% OK (Requires DPE restart "> dpe reload")
dpe# service http 2 port 7550
% OK (Requires DPE restart "> dpe reload")
dpe# service http 2 ssl enable true
% OK (Requires DPE restart "> dpe reload")
dpe# service http 2 ssl keystore train-1.keystore changeme changeme2
% OK (Requires DPE restart "> dpe reload")
dpe# service http 2 ssl client-auth none
% OK (Requires DPE restart "> dpe reload")
dpe# service http 1 enable false
% OK (Requires DPE restart "> dpe reload")
dpe# service http 2 enable true
% OK (Requires DPE restart "> dpe reload")
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-12
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring Security for DPE Services
dpe# dpe reload
Process dpe has been restarted.
% OK
Note
Configuring CPE Authentication
CPE authentication is supported through:
•
•
Shared secret by using HTTP Basic or Digest authentication.
Client certificates by using SSL. You can use certificate-based client authentication in lieu of or in
addition to shared secret HTTP-based authentication.
•
External client certificate authentication. In this scenario, the SSL connection is terminated at the
hardware load balancer, which also authenticates the client.
The objective of authentication is to establish a trusted device ID, which is used to look up device
instructions in the DPE cache. This device ID correlates to the device identifier preprovisioned for the
device record at the Cisco BAC RDU database. In case of shared secret HTTP-based authentication, the
username serves to establish the identity of the device and is treated as a device ID.
In case of authentication using unique client certificates, the device ID is obtained from the device
certificate's CN field. With client certificate authentication by an external entity (such as a Cisco ACE
4710 load balancer), the certificate data, including the CN field, is passed to the DPE in the HTTP
headers.
You can also choose the option of having no client authentication if clients are trusted. For example, the
clients can already be authenticated for network access based on the subscriber physical line. In this case,
you can configure Cisco BAC with no-authentication and it will derive the trusted device ID from the
Inform message.
You can configure CPE authentication options from the DPE CLI.
Shared Secret Authentication
Cisco BAC supports HTTP authentication based on a shared password between the CPE and the DPE.
This authentication is available in two modes: Basic and Digest.
Note
To limit security risks during client authentication, Cisco recommends using the Digest mode (the
default configuration). You should not allow client authentication in the Basic mode.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-13
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring Security for DPE Services
To configure authentication in the Basic or Digest mode from the DPE CLI, use:
# service {cwmp | http} num client-auth mode
•
•
num—Identifies an instance the service, which could be 1 or 2.
mode—Identifies the client authentication mode for the service. The client authentication mode
could be:
–
–
–
basic—Enables Basic HTTP authentication.
digest—Enables Digest HTTP authentication. This is the default configuration.
none—Disables Basic and Digest authentication.
Changing a Device Password
You can configure the shared secret for the device in Cisco BAC. The shared secret is stored on the
device record by using the IPDeviceKeys.CPE_PASSWORDproperty. The CPE must prove knowledge of
this password during HTTP-based authentication.
In the Basic mode, the password is transmitted as encoded clear text, while in the Digest mode, the
device is allowed to prove knowledge of the password (shared secret) without transmitting it.
You can configure the password:
•
•
On the API, using the property IPDeviceKeys.CPE_PASSWORD.
On the administrator user interface, using the CPE Password field in the Devices > Add Device or
Modify Device pages.
Note
You cannot change the CPE password if the DPE connection to the RDU is not available.
The CPE password is optional if you have enabled client authentication by using SSL and with client
certificates.
A distinction should be drawn between changing the password used by Cisco BAC and the password
used by the device. When you configure a password on the device record in Cisco BAC, the outcome
differs depending on the previous value of the password.
If the password was already set on the device record, Cisco BAC changes it and initiates the process of
changing the password on the actual device. However, if the prior password value on the device record
did not exist (or was an empty string), Cisco BAC sets the new password on the device record, but does
not initiate the change of password on the actual device.
Hence, if you wish to change the password from the existing value to another value only in Cisco BAC,
you must first reset the value in Cisco BAC (set it to an empty string) and then set it to a new value.
Figure 13-1 describes the process that Cisco BAC uses to change the password on the actual device. This
process is complicated by the fact that Cisco BAC needs to use the old password to authenticate the
device first, and then set the new password. Only after the password change is acknowledged can Cisco
BAC forget the previous password and remove it from its database.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-14
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring Security for DPE Services
Figure 13-1
Change Password Flow
API
RDU
DPE
Device
Change Password
Operation Pending
Change Password Instruction
Establish Session
Change Password
Password Changed
Configuration with New Password
After the password is changed on the device object in the RDU, the change password instruction is
included in the device configuration. At this point, the old password is still used to authenticate the
device. The new configuration instruction is then forwarded to all the DPEs in the device’s provisioning
group.
When the device creates its next session with Cisco BAC, the device is authenticated with its old
password; then, its new password is set using the SetParameterValues RPC. Once the DPE notifies the
RDU of the change, the RDU changes the device password and generates a new configuration
instruction, which includes the new password. Thereafter, the old password is no longer stored in Cisco
BAC.
It is possible to change the new password up until it is set on the device. For example, if the original
password of a device (password) has been changed to newpassword. But with the device yet to connect
with Cisco BAC in order to set the new password, you can still change the password; for this purpose of
this example, assume that the password is now changed to n3wpa550d.
The device continues to be authenticated with the old password (password) until the device connects to
Cisco BAC. The new password (n3wpa550d) is set during the device’s next session with Cisco BAC.
Correcting a Device Password
You can also change an incorrectly spelled password, in the RDU. For example, if you entered passwrod
instead of password, first remove the password and then submit it. At this point, the device object does
not have a password associated with it. Then, add the password on the device.
Note
Use this method to change the password in Cisco BAC, but not the one on the device.
To correct a device password from the administrator user interface:
Step 1
From Devices > Manage Devices, click the Identifier link corresponding to the correct device.
The Modify Device page appears.
Step 2
Step 3
Step 4
Delete the device password in the CPE Password field.
Click Submit.
Return to the Modify Device page and enter the correct password.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-15
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring Security for DPE Services
Step 5
Click Submit.
The password is now changed on the device record in the RDU; no change of password on the actual
device is initiated after this procedure.
Client Certificate Authentication
You can configure the DPE to require a validated device-provided certificate for authentication. These
certificates could be:
•
Generic—Enables device certificate authentication through SSL by using a generic certificate
common to all CPE or a large subset of CPE.
•
Unique—Enables client certificate authentication through SSL by using the unique certificate that
each CPE provides.
If the device certificates are unique, it is not necessary to use HTTP authentication. But if the same
certificate is used for all devices (that is, a single device certificate that a service provider uses), you
should configure an additional HTTP authentication.
To configure client certification authentication from the DPE CLI, use:
# service {cwmp | http} num ssl client-auth mode
•
•
num—Identifies the instance of the service, which could be 1 or 2. By default, client certificate
authentication with SSL is:
–
–
Disabled for service 1.
Disabled for service 2.
mode—Identifies the mode of client certificate authentication. Cisco BAC supports:
–
–
–
–
client-cert-generic—Uses a certificate common to a set of devices.
client-cert-unique—Uses a certificate unique to a device.
client-cert-ext—Uses a load balancer, such as ACE, to validate the client certificate.
none—Disables client certificate authentication.
External Client Certificate Authentication
An SSL connection can be terminated outside of the DPE, such as at a load balancer. In this case, the
DPE may be configured without SSL service.
If a load balancer such as ACE, is used to terminate the SSL connections, the DPE does not receive the
unique certificate, making it impossible to identify the device without HTTP authentication (Basic or
Digest). To overcome this, the load balancer inserts additional HTTP headers that include the certificate
information.
If a single session includes multiple TCP connections, each of the connections will be authenticated (if
enabled). The session cookie binds the device to the existing session state.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-16
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring Security for DPE Services
Authentication Options in Cisco BAC
This section provides a summary of possible combinations of client-authentication options available in
Cisco BAC for the CWMP and the HTTP file services. You can configure each instance of these services
separately from the DPE CLI to suit your requirements.
Cisco BAC supports HTTP authentication in the Basic and Digest modes based on a shared password
between the CPE and the DPE. If HTTP-based authentication is used, Cisco recommends use of the
Digest mode.
You can also configure CPE authentication by using certificates unique to each CPE. In this case, HTTP
authentication is not necessary. However, if you configure CPE authentication using generic certificates
that are common to all CPE or a large subset of CPE, it is recommended that you configure the DPE to
require an additional HTTP authentication.
Table 13-3 lists the various options that Cisco BAC supports and the commands you use to configure
authentication from the DPE CLI. For details on each command, see the Cisco Broadband Access Center
Table 13-3
Authentication Options in Cisco BAC
Option
Refer to ...
Using HTTP
Enable device authentication by
using HTTP in the Basic or Digest
mode
service {cwmp | http} num client-auth {basic | digest}
service {cwmp | http} num client-auth none
Disable device authentication
using HTTP
Note
If device authentication using HTTP is disabled, trusted device identity is formed using the
values in the Inform message from the device.
Using SSL
Enable device authentication in
HTTP Basic or Digest mode over
SSL connection but without client
certificate authentication
service {cwmp | http} num client-auth {basic | digest}
service {cwmp | http} num ssl client-auth none
Enable device authentication in
HTTP Basic or Digest mode over
SSL connection based on unique
client certificates
service {cwmp | http} num client-auth {basic | digest}
service {cwmp | http} num ssl client-auth client-cert-unique
Note
When you configure the DPE to require HTTP-based (Basic or Digest) and authentication by
using unique certificates, the device is authenticated by using both mechanisms. In this double
authentication scenario, the device’s unique identifier is formed by using the CN field of the
client certificate; thus establishing trusted device ID.
Enable device authentication in
HTTP Basic or Digest mode over
SSL connection based on generic
client certificates
service {cwmp | http} num client-auth {basic | digest}
service {cwmp | http} num ssl client-auth client-cert-generic
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-17
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring Security for RDU Services
Table 13-3
Authentication Options in Cisco BAC (continued)
Option
Refer to ...
Enable device authentication by
service {cwmp| http} num client-auth {basic | digest}
service {cwmp | http} num ssl client-auth client-cert-ext
using HTTP Basic or Digest
authentication and client certificate
authentication by ACE
Note
In this double authentication scenario, the trusted device ID is established based on
authentication by ACE and communicated to the DPE using the HTTP headers.
Enable device authentication based service {cwmp | http} num ssl client-auth client-cert-ext
on client certificates validated by
ACE
Disable device authentication and service {cwmp | http} num client-auth none
client certificate authentication.
service {cwmp | http} num ssl client-auth none
Note
If device authentication and client-certificate authentication is disabled, devices are considered
to be trusted or pre-authenticated, and the DPE uses data from the CWMP Inform message to
establish trusted device identity.
Disable HTTP-based device
authentication and enable client
authentication through SSL by
using the unique certificate
provided by each CPE
service {cwmp | http} num client-auth none
service {cwmp | http} num ssl client-auth client-cert-unique
Disable HTTP-based device
authentication and enable client
authentication through SSL by
using a generic certificate
service {cwmp | http} num client-auth none
service {cwmp | http} num ssl client-auth client-cert-generic
Note
If HTTP-based device authentication is disabled and client-certificate authentication is enabled
to use generic certificates, devices are considered to be trusted or pre-authenticated and the
DPE uses data from the CWMP Inform message to establish trusted device identity.
Disable HTTP-based device
authentication and enable
authentication based on client
certificates validated by ACE
service {cwmp | http} num client-auth none
service {cwmp | http} num ssl client-auth client-cert-ext
Configuring Security for RDU Services
Cisco BAC supports local authentication as well as TACACS+ authentication. Local authentication is
managed locally at the:
•
•
DPE server, for DPE CLI
RDU server, for the
–
–
Administrator user interface
Cisco BAC APIs
TACACS+ authentication relies on the TACACS+ protocol to support centrally managed user
authentication using the TACACS+ server. The TACACS+ username, login password, and enable
password are configurable at the TACACS+ server.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-18
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Configuring Security for RDU Services
You can select one of the authentication modes by using the administrator user interface. Local
authentication option is the default.
RDU Authentication Mode Settings
You can select either local or TACACS+ authentication by using the administrator user interface. To
enable TACACS+ authentication:
Step 1
Step 2
Choose Configuration on either the Primary Navigation bar or Main Menu page.
Choose Defaults from the Secondary Navigation bar.
The Configure Defaults page appears.
Step 3
Click TACACS+ Defaults link on the left pane.
The TACACS+ Defaults page appears.
Step 4
Step 5
Check the TACACS+ Authentication check box.
Set the TACACS+ server and encryption key.
You can specify up to maximum of 5 TACACS+ servers. The order of the entries determines the order
in which the TACACS+ servers are tried.
Step 6
Step 7
Step 8
Set the TACACS+ Client Read/Write timeout.
This is the time that the TACACS+ client waits for a TACACS+ server to reply to TACACS+ protocol
requests. The range is from 1 to 300 seconds. The default is 5 seconds and applies to all TACACS+
servers.
Set the TACACS+ Client Maximum retries.
This is the number of times that the TACACS+ client attempts a valid TACACS+ protocol exchange with
a TACACS+ server if it fails to respond to initial request. The range is from 0 to 10. The default is 1 and
applies to all TACACS+ server defined.
Click Submit.
TACACS+ Authentication and Authorization in RDU
When TACACS+ authentication is enabled, the client attempts user login authentication to each server
sequentially in the list until a successful authentication exchange is executed, or the list is exhausted. If
the list is exhausted, the client automatically falls back into the local authentication mode (using the
local system password).
After the TACACS+ authentication is done, the user authorization (i.e, user role as Admin, read-write
user or read-only user) is retrieved from the RDU database. You can specify the user role (read-write or
a read-only) in the Add Users page in the administrator user interface.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-19
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Signed Configuration for Devices
Signed Configuration for Devices
Cisco BAC uses the Signed Configuration feature to sign a portion of the CPE configuration that is
targeted to be passed by the CPE to a third-party, such as an aggregation device. For example, a CPE
with Femtocell functionality passes the access control entries to the Femtocell Gateway.
The configuration is signed using a secret key that is shared between Cisco BAC and the Gateway. This
Signed Configuration eliminates the need to separately configure the Gateway for each individual CPE.
The signature provides proof to the Gateway that the configuration:
•
•
•
•
•
Was generated by Cisco BAC.
Was not falsified during transmit.
Is targeted for a specific CPE.
Is targeted for a specific Gateway.
Is current.
To prevent replay attacks, the time of the signature generation and its validity period are also
incorporated in the signature.
Signature Expiration
Cisco BAC is configured with a signature validity period that determines the window during which the
device communicates the signed data and signature to the Gateway. If the device communicates the data
to the gateway beyond that validity period, the gateway rejects the signature.
The gateway can also be configured to cache configurations beyond their signature validity period,
provided the device reconnects to the gateway within a certain interval. This behavior reduces the load
of signature regenerations for active devices and allows the device to not persist a security-sensitive
signature across reboots.
Signature Regeneration
The DPE generates a new signature and sets it on a device only if:
•
•
•
The Signed Configuration parameters at the RDU are changed in the data model or in the
configuration template.
The device reports to the DPE that the Gateway rejected the signature for reasons such as invalidity
or expiration.
Device reports to the DPE that it does not have a signature.
Configuration Interfaces
You can enable the Signed Configuration feature in Cisco BAC by configuring the following properties:
•
•
Signature Validity—Specifies the number of seconds for which the signature is considered valid
Signature Key Name— Indicates the name of the key that is used by the gateway to look up the
shared secret key. You must change the signature key name when the secret key is changed.
•
Secret Key—Specifies the secret that is used to compute the signature.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-20
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Signed Configuration for Devices
These properties can be configured using the CWMP Defaults page in the administrator user interface
or by using the IPDevice.changeDefaults API.
You must also create a configuration template for the device. To generate the Signed Configuration, at
least one parameter in the template must be flagged to be signed. You can flag any TR069 parameter to
be signed.
For example:
<Parameter>
<Name>MyParameter</Name>
<Value>Sample Value</Value>
<ToBeSigned>true</ToBeSigned>
</Parameter>
Depending on the target Gateway, there can be a minimum set of required parameters that must be
specified as signed. Here is a sample CWMP configuration template:
<tc:Template
...
<configuration>
<ParameterDictionaries>
<ParameterDictionary>femto-cwmp-dictionary.xml</ParameterDictionary>
</ParameterDictionaries>
<ObjectInstance name=”Device”>
<ObjectInstance name=”Services”>
<ObjectInstance name=”X_00000C_FAPService”>
<ObjectInstance name=”AccessControl”>
<Parameter>
<Name>ACL</Name>
<Value>VAR(name=FC-ACL, defaultValue=””)</Value>
<ToBeSigned>true</ToBeSigned>
</Parameter>
</ObjectInstance>
<ObjectInstance name=”FGW”>
<Parameter>
<Name>Fqdn</Name>
<Value>VAR(name=FC-FGW-FQDN, defaultValue=””)</Value>
<ToBeSigned>true</ToBeSigned>
</Parameter>
</ObjectInstance>
</ObjectInstance>
</ObjectInstance>
Monitoring the Signed Configuration Feature
You can monitor the Signed Configuration feature in Cisco BAC from the administrator user interface
or DPE CLI. You have the following options:
•
Choose Configuration > Files. Click the View icon ( ) corresponding to the Configuration
Template to view the configuration parameters that are designated to be signed.
•
From the Devices > Manage Devices page, click the View Details icon ( ) corresponding to the
device. The following device faults are reported in the Device Details page:
–
–
–
Signature rejected by the gateway because the validity period has expired.
Signature rejected by the gateway because of an unknown secret key name
Signed data rejected by the gateway because it is missing required parameters
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-21
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 13 Configuring CWMP Service Security
Signed Configuration for Devices
–
Incompatible device. Template contains parameters designated for signing, but the device does
not report any expected support for the Signed Configuration feature
•
•
To get basic information about the Signed Configuration process, enable the INFO logging level on
the RDU and the DPEs. At this level of logging, the following are logged:
–
–
–
Changes in the Signed Configuration (in rdu.log)
Details on the generation and setting of a new signature on a device (in dpe.log)
Indications of signature rejection by the device (in dpe.log)
You can use the debug on and debug service cwmp num cpe-signed-config-sync commands to
obtain the low-level tracing information in addition to the INFO level logging.
Troubleshooting Signed Configuration Feature
When a device is placed in troubleshooting mode, all logging and debugging level details associated with
Signature Generation are incorporated into the device troubleshooting log file. To view the device
You can use the perfstat.log to view statistics on the number of times that the DPE:
•
•
Generates and sets the signature on a device.
Receives signature faults from a device.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
13-22
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
14
CWMP Device Operations
This chapter describes the device operations mechanism in Cisco Broadband Access Center (BAC). By
using this mechanism, you can run CPE WAN Management Protocol (CWMP) remote procedure calls
for a device and perform maintenance tasks, such as changing a device’s provisioning group.
This chapter includes the following sections:
•
•
•
Overview
You use device operations to run individual CWMP remote procedure calls (RPCs) against a device
immediately, or the next time the device connects to Cisco BAC. By using this feature from the
provisioning API, you can troubleshoot, collect data, or customize the interaction between a device and
Cisco BAC.
Device operations are submitted in a batch by using the IPDevice.performOperation() API call. For
details, refer to the API Javadoc which is available at BPR_HOME/docs/nb-api/javadoc.
You can perform some operations from the administrator user interface. This section is focused on
describing the concepts behind device operations, regardless of whether they are initiated using the API
or the administrator user interface.
During a Cisco BAC installation, several sample files are copied to the BPR_HOME/rdu/samples
directory, which contains:
•
•
The cwmp directory, which features *parameter-list.xml files that describe parameter lists used to
retrieve live device data by using the administrator user interface.
The nb-api directory, which features CwmpDiagnosticImmediateExample.java and
CwmpDiagnosticOnConnectExample.java files that describe how you can perform device
operations by using the API.
Table 14-1
Device Operations Supported in Cisco BAC
Operation Name
Description
CreateObjectInstance
DeleteObjectInstance
Creates object instances within a device’s data model
Deletes objects from a device’s data model
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
14-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 14 CWMP Device Operations
Connection Modes for Device Operations
Table 14-1
Device Operations Supported in Cisco BAC (continued)
Operation Name
Download
Description
Instructs the device to perform a file download
Resets a device’s settings to its factory default state
Instructs the device to reboot
FactoryReset
Reboot
GetParamAttributes
GetParamNames
GetParamValues
GetRPCMethods
SetParamAttributes
Retrieves attributes for a device’s parameters
Retrieves names of parameters exposed by a device
Retrieves parameter values from a device’s parameter space
Retrieves a device’s list of supported RPC methods
Sets the value of device parameter attributes, such as Notification and
Access List
SetParamValues
ChangeProvGroup
GenerateConfig
PassThrough
Sets the value of device parameters
Redirects a device to a new provisioning group
Regenerates the instruction set for a device
Sends a generic SOAP message to the device
Removes a pending on-connect device operation
Initiates a connection request to a device
RemoveOperation
RequestConnection
All device operations are executed before other configuration services, such as data synchronization,
configuration synchronization, and firmware rules download.
Caution
You should not perform device configuration updates using device operations. The configuration process
can overwrite any settings that you configured by using device operations.
Connection Modes for Device Operations
Cisco BAC enables the performing of device operations in three modes:
•
•
•
Immediate
On-connect
Asynchronous
Immediate Mode
An immediate execution assumes that the device is reachable and is performed by the DPE first issuing
a connection request to the device. If the device is not reachable, the operations automatically fail. You
can run multiple operations in the same batch to improve performance, creating a single connection
request and, thus, a single management session with the CWMP device.
A client uses a timeout period to post the API batch in immediate mode. If no timeout is set, the duration
for immediate operations to time out is, by default, 60 seconds. If a device operation times out or its
batch times out, an error is returned.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
14-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 14 CWMP Device Operations
Connection Modes for Device Operations
Note
Before attempting to run immediate operations against a device, ensure that the device is reachable and
that Cisco BAC is configured to perform connection requests to the device. See Connection Request
Figure 14-1 illustrates the high-level flow for immediate operations.
Figure 14-1
Immediate Operation Mode Workflow
API
RDU
DPE
Device
Submit Operation
Immediate Operation
Connection Request
Connection Request
Establish Session
Execute Operation
Operation Result
Operation Result
Operation Result
When the performOperation() API method is invoked specifying an immediate execution, the RDU
constructs and sends corresponding operation instructions to all DPEs in the device’s provisioning
group. Then, the RDU sends a connection request instruction to a specific DPE within the provisioning
group; the DPE, in turn, sends a connection request notification to the device.
When the device establishes a connection with the DPE, the DPE creates a new session and performs the
operation upon the device. When the session is closed, the DPE returns the result of the operation to the
RDU, which forwards the result to the API client in the Batch’s command status.
Note
You must use the batch mode flag, AUTOMATIC during the immediate mode.
On-Connect Mode
You can use an on-connect execution to support devices that are not reachable. It is best used in
conjunction with periodic Inform RPCs from the CWMP device.
On-connect operations persist at each DPE in the device’s provisioning group. They are not removed
from the DPEs until the RDU instructs the DPEs to do so (after notifying the client of the execution
results using an AsyncOperationEvent).
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
14-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 14 CWMP Device Operations
Connection Modes for Device Operations
Figure 14-2 illustrates the high-level flow for on-connect operations.
Figure 14-2
On-connect Operation Mode Workflow
API
RDU
DPE
Device
Submit Operation
On Connect Operation
Operation Pending
Establish Session
Execute Operation
Operation Result
Operation Result
Operation Result
Remove On Connect Operation
The API client constructs an IPDeviceOperation specifying an on-connect execution. It registers the
appropriate AsyncOperationEvent listeners, then invokes the performOperation() API method. The RDU
then constructs and sends corresponding operation instructions to all DPEs in the device’s provisioning
group. The DPEs save the operation in their internal database. The RDU batch completes, and the
BatchStatus is returned to the API client.
The DPE does not initiate a connection request notification to the device, as it does while running an
immediate operation.
When the device connects to the DPE the next time, the DPE creates a new session with the device and
runs the operation upon the device. When the session is closed, the operation result is sent to the RDU,
and the RDU sends an AsyncOperationEvent to any registered API client listeners.
Immediate operations are always run before on-connect operations. While you can use Cisco BAC to
mix modes of operations along with the built-in instructions, you must ensure that the instructions do
not override one other.
For example, if the device's configuration template specifies False for
InternetGatewayDevice.ManagementServer.PeriodicInformEnable and a device operation changes that
to True, the configuration template, which runs only after the device operation, overrides it to False.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
14-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 14 CWMP Device Operations
Connection Modes for Device Operations
Asynchronous Mode
Asynchronous mode facilitates the RDU to execute the asynchronous immediate operation without
reserving a PACE thread for the complete operation. The TR-069 IPDevice operations like
GetParameterValues and GetParamValues RPC can be performed with this mode. This feature helps in
increasing the RDU efficiency in serving more number of API operation requests.
The asynchronous operation is performed as follows:
1. The API client submits asynchronous operation batches to the RDU.
2. The RDU sends the asynchronous operation request to the DPE.
3. After receiving an acknowledgment from the DPE, RDU sends a connection request to DPE. The
DPE then sends a connection request to the CPE.
4. The DPE sends the connection request result to the RDU.
5. If connection request fails, DPE sends an AsyncOperationEvent event to the RDU with the
connection request status and the RDU releases the PACE thread.
6. When the connection request to CPE is successful, the CPE establishes a session in a separate
thread, and the DPE executes the asynchronous operation on the CPE.
7. The CPE sends the operation results to DPE, and DPE further sends the operation result to RDU.
8. RDU processes the operation result and further sends an AsyncOperationEvent event to API client
with the operation result.
Figure 14-3 illustrates the high-level flow for asynchronous operations.
Figure 14-3
Asynchronous Operation Mode Workflow
RDU DPE
API
Device
Submit Operation
Async Operation
ACK
Connection Request
Connection Request
Connection Request Result
AsyncOperationEvent for
Failed Connection Request
PACE Thread is Released
Establish Session
Execute Operation
Operation Result
Operation Result
AsyncOperationEvent for
Operation Result
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
14-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 14 CWMP Device Operations
Managing a Device’s Provisioning Group
Note
You must use the batch mode flag, ASYNC_AUTOMATIC during the asynchronous operation mode.
The API command Configuration.getRDUDetails()is enhanced to report statistics of the following
asynchronous operations:
•
•
•
•
•
•
•
•
Total number of asynchronous operation requests received by the RDU.
Total number of asynchronous operation succeeded.
Total number of asynchronous operation failed.
Minimum time taken for asynchronous operation.
Maximum time taken for asynchronous operation.
Average time taken for asynchronous operation.
Total time taken for all asynchronous operations.
Total number of asynchronous immediate operations failed due to acknowledgment failed from
DPE.
•
•
•
•
Total number of asynchronous operations failed due to DPE server not found in Provisioning Group.
Total number of asynchronous operations failed due to connection request error.
Total number of asynchronous operations failed due to connection request failed.
Total number of connection request succeeded for asynchronous operations requests.
Conditional Execution
Additionally, immediate and on-connect operations are conditionally executed based on the TR-069
Event Codes in the Inform message from the device. If no intersection occurs between the reported Event
Codes in the device’s Inform and the list of Event Codes specified in the operation, the operation is not
executed.
For example, an operation might be conditional upon the Inform Event Code list including 6 CONNECTION
REQUEST. Therefore, the operation only executes if the device reports it is connecting because of an
autoconfiguration server (ACS) connection request. If the device reports it is connecting for any other
reason, for instance a periodic Inform, the operation does not execute.
Managing a Device’s Provisioning Group
The provisioning group for a CWMP device is specified on the device object in the RDU. On the:
•
•
Provisioning API, through the IPDeviceKeys.HOME_PROV_GROUPproperty.
Administrator user interface, through the Home Provisioning Group drop-down list in the Devices
pages.
In managing a device’s provisioning group, occasionally, you might need to redirect or correct the
provisioning group of a device:
•
In this scenario, the device communicates with a specific provisioning group, for example PG1, and
you want to redirect it to communicate with its home provisioning group, PG2.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
14-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 14 CWMP Device Operations
Managing a Device’s Provisioning Group
•
In this scenario, the device’s provisioning group in Cisco BAC is incorrect and must be changed only
in Cisco BAC; for example, the device attempts to contact PG1 but is provisioned for PG2 in Cisco
BAC.
Both use cases are described in detail in the following sections.
Note
You cannot change a device’s provisioning group if the DPE cannot connect to the RDU.
Redirecting CPE to Home Provisioning Group
Cisco BAC redirects a device to its home provisioning group by having the provisioning groups
communicate among themselves to find the device’s correct home provisioning group.
When a device attempts to establish a session with a DPE, the DPE searches its cache for an entry related
to that device. If it cannot find an entry for that device, it sends home provisioning group queries to the
DPEs in other provisioning groups.
Note
If the home provisioning group is down or is not responding, the DPE that receives the Inform message
returns the 503 Service Unavailable error along with the Retry-After header. Thereafter, the session with
the device is dropped.
To select the best available DPE in each provisioning group, the DPE maintains the status data of all
other DPEs in the deployment. The DPE sends a status request at configured time intervals to update its
knowledge of the state of other provisioning groups.
Each state has a corresponding integer value. The higher the value, the better the state of the provisioning
group. The DPE, using its knowledge of the current state of other DPEs, selects a DPE in the highest
state in each provisioning group.
After sending the home provisioning group query, the DPE waits for a response from the other
provisioning groups. If a provisioning group responds that the device belongs to its group, then the DPE
redirects the device to its home provisioning group.
Figure 14-4 highlights the basic flow when a device attempts to establish a session with the wrong
provisioning group.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
14-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 14 CWMP Device Operations
Managing a Device’s Provisioning Group
Figure 14-4
Redirecting CPE to Home Provisioning Group
CPE
DPE 1 in PG 1
DPE 1 in PG 2
DPE 1 in PG N
Establish Session
Your CPE?
Yes
Your CPE?
No
Redirect to PG 2
1. The CPE attempts to establish a session with DPE 1 in provisioning group 1 (PG 1).
2. DPE 1 in PG 1 searches its cache for the device.
If it cannot find an entry for that device, the DPE sends a request to the best available DPE in each
provisioning group to find out whether the device belongs to that group.
Only one DPE per provisioning group is queried.
3. The DPEs that receive the request in each provisioning group, send their reply to DPE 1.
If a provisioning group responds that the device belongs to its group, then DPE 1 in PG 1 redirects
the CPE to its home provisioning group.
4. The CPE attempts to establish a session with its home provisioning group.
To enable the home provisioning group redirection feature, you must configure the home provisioning
group redirection service on the DPE. See Configuring Home Provisioning Group Redirection Service
Correcting a Device’s Provisioning Group
You can also just reset an incorrect provisioning group specification on the device. In this scenario, you
do not need to change the actual device—you only need to update Cisco BAC.
To change an incorrect provisioning group from the API, invoke the IPDevice.changeProperties()
API and include the IPDeviceKeys.HOME_PROV_GROUPproperty with the corrected provisioning group.
For details, refer to the API Javadoc which is available at BPR_HOME/docs/nb-api/javadoc.
To change an incorrect provisioning group specification from the administrator user interface:
Note
If you change the home provisioning group from the administrator user interface, you only correct the
provisioning group in Cisco BAC; the change does not affect the device.
Step 1
Click the Devices tab on the primary navigation bar.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
14-8
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 14 CWMP Device Operations
Managing a Device’s Provisioning Group
The Manage Devices page appears.
Click the Identifier link corresponding to the correct device.
Step 2
Step 3
Step 4
Select your options from the Home Provisioning Group drop-down list.
Click Submit to save the changes to the device.
The device is now assigned to a specific provisioning group.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
14-9
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 14 CWMP Device Operations
Managing a Device’s Provisioning Group
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
14-10
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
15
Understanding the Administrator User Interface
This chapter describes how to access the Cisco Broadband Access Center (BAC) administrator user
interface and explains the interface.
This chapter includes the following sections:
•
•
•
Using the Administrator User Interface, page 16-1, explains how to use the user interface to perform
contains descriptions of the CLI commands used to access, monitor, and control the Device Provisioning
Engines (DPEs).
Configuring the Administrator User Interface
When you install the RDU, the installation program also installs the administrator user interface. The
administrator user interface starts by default, when the RDU is installed.
Before you use the administrator user interface, examine the adminui.properties file. This file contains
a variety of controls that specify the behavior of the interface.
You can open this file by using any text editor, and change its content to perform the functions that you
want. After your changes are complete and saved, restart the user interface so that all the changes to take
effect.
To start the administrator user interface, enter:
# etc/init.d/bprAgent tomcat start
To stop the administrator user interface, enter:
# etc/init.d/bprAgent tomcat stop
You can configure the user interface by using the options available in the adminui.properties file. These
options are controlled by Cisco BAC settings or defined in the adminui.properties file in the
BPR_HOME/rdu/conf directory.
The configuration parameters are:
•
•
/adminui/port—Specifies the listening port of the RDU. This port number is, by default, 49187.
/adminui/fqdn—Specifies the fully qualified domain name of the host on which the RDU is running.
This value is, by default, the FQDN of the host; for example, bac_test.ACME.COM.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
15-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 15 Understanding the Administrator User Interface
Accessing the Administrator User Interface
•
•
•
•
/adminui/maxReturned—Specifies the maximum number of search results. This number is, by
default, 1000.
/adminui/pageSize—Specifies the number of search results displayed per page. You can set this
number at 25, 50, or 75. The default value is 25.
/adminui/refresh—Specifies if the refresh function is enabled or disabled. This option is, by default,
disabled.
/adminui/extensions—Specifies if the use of extensions in Cisco BAC is enabled or disabled. You
use extensions to augment Cisco BAC behavior or add support for new device technologies. The use
of extensions is, by default, enabled.
•
•
/adminui/maxFileSize—Specifies the maximum size of a file uploaded to Cisco BAC. This file size
is, by default, 10 MB.
/adminui/refreshRate—Specifies the duration (in seconds) after which a screen is refreshed. This
value is, by default, 90 seconds. Before setting a value for this option, ensure that the
/adminu/refresh option is enabled.
•
•
•
/adminui/timeout—Specifies the duration (in minutes) after which an idle session is timed out. This
period is, by default, set as 300 minutes.
/adminui/noOfLines—Specifies the last number of lines from the rdu.log or the dpe.log that will be
displayed on the user interface. The number of lines that appear, by default, is 250.
/adminui/noOfFiles—Specifies the number of troubleshooting log files that you can view. The
number of files you can view is, by default, 1. The maximum number of files that you can view at a
given time is 5.
Example 15-1 Sample adminui.properties File
/adminui/port=49187
/adminui/fqdn=doc.cisco.com
/adminui/maxReturned=1000
/adminui/pageSize=25
/adminui/refresh=disabled
/adminui/extensions=enabled
/adminui/maxFileSize=10000000
/adminui/refreshRate=90
/adminui/timeout=300
/adminui/noOfLines=250
/adminui/noOfFiles=1
Accessing the Administrator User Interface
You can access the administrator user interface from any computer that can access the URL
corresponding to the Cisco BAC application.
Logging In
You can log into the user interface as an Administrative user, a Read/Write user, or a Read-Only user.
access the user interface in the same way.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
15-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 15 Understanding the Administrator User Interface
Accessing the Administrator User Interface
Complete this procedure to access the administrator user interface:
Step 1
Launch your web browser.
Table 15-1 lists the browsers supported in this Cisco BAC release.
Table 15-1
Browser Platform Support
Platform
Supported Browsers
Windows 2000 (Service pack 2)
Internet Explorer 6.0 and above
Mozilla 3.0.8
Windows 2000, Windows XP, Solaris, Linux
Step 2
Enter the administrator’s location using this syntax:
http://machine_name/
•
machine_name—Identifies the computer on which the Regional Distribution Unit (RDU) is running.
Note
To access the administrator user interface by using HTTP over SSL, also known as HTTPS,
enter: https://machine_name/
The server-side of the administrator application runs on a computer port. By default, this port number is:
•
•
80 for HTTP over TCP
443 for HTTP over SSL
The main login page appears.
Step 3
Enter the default username (bacadmin) and password (changeme).
If you are logging in for the first time, the Change Password screen appears. Enter a new password and
confirm it.. Note that the FQDN of the RDU server you are logged into appears in the User Login area.
Step 4
Step 5
Click Login,
The Main Menu page appears.
Use the link at the top of the page to add new Cisco BAC licenses.
From this page, you can enter the technology licenses that you are authorized to use. For more
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
15-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 15 Understanding the Administrator User Interface
Understanding the Administrator User Interface Icons
Logging Out
To log out of Cisco BAC:
Step 1
Step 2
Click Logout at the top right corner of any page.
A confirmation dialog appears.
Click OK.
This returns you to the User Login page.
Understanding the Administrator User Interface Icons
The Cisco BAC administrator user interface features icons, which you can use to perform specific
Table 15-2
Icon
Administrator User Interface Icons
Description
This icon serves as:
•
•
View Details icon—Enables you to view details of a given device or file.
Operations icon—Enables you to run operations on a given device.
Delete icon—Deletes a specific object.
Export icon—Exports the contents of a specific file to the client’s computer.
These icons are used in sections describing procedures that you perform using the administrator user
interface. These sections include:
•
•
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
15-4
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
16
Using the Administrator User Interface
This chapter describes the administration tasks performed from the Cisco Broadband Access Center
(BAC) administrator user interface. These tasks mainly involve monitoring the actions of various Cisco
BAC components.
This chapter includes the following sections:
•
•
•
•
Note
The procedures described in this chapter are presented in a tutorial manner. Wherever possible, examples
are included to illustrate the possible results of each procedure.
User Management
Managing users involves adding, modifying, and deleting users who administer Cisco BAC. Depending
on your user type, you can use this menu to add, modify, and delete users. This menu displays all users
configured to use Cisco BAC and identifies their user types.
There are three types of Cisco BAC users: an Administrator, a Read/Write user, and a Read-Only user.
Each has different levels of access, with unique permissions to ensure access control and the integrity of
provisioning data.
The assigned user type appears near the top right corner of every screen on the administrator user
interface.
Administrator
Cisco BAC recognizes only one administrator and allows this user to view, add, modify, delete device
data, and create other users. As an Administrator, you can also change other users’ permissions from
Read/Write to Read Only, and vice-versa. In addition, you have the ability to change the passwords of
any other user type.
You cannot delete the “Administrator” user.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
User Management
Read/Write User
As a Read/Write user, you can perform the same functions as the administrator except creating other
users, changing the user types of others, or changing their passwords. Read/Write users can change their
own password.
Read-Only User
As a Read-Only user, you have basic access including the ability to change your password and to view,
but not change, device data. You cannot perform any action that is considered disruptive. You cannot,
for example, perform reset or regenerate instructions.
This section contains instructions for managing Cisco BAC users including:
•
•
•
Note
You can add and delete users only if you are logged in as the Administrator.
Adding a New User
Adding a new user is a simple process of entering the user’s name and creating a password. However,
while creating a new user you do have to determine which type of user it will be: a Read/Write user or
a Read-Only user. Cisco BAC comes with one Administrator user already created; you cannot create an
Administrator as a new user.
To add a new user:
Step 1
Step 2
Click Users, from the Main Menu or the Primary Navigation bar.
Click Add to display the Add User page.
Figure 16-1
Manage Users Page
Step 3
Enter the new user’s username and a password.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
User Management
Step 4
Step 5
Confirm the new user’s password, and select whether the new user’s role is to be read only or read/write.
Enter a short description of the new user.
Tip
Use the description field to identify the user’s job or position, something that identifies the
unique aspects of the new user.
Step 6
Click Submit.
The Manage Users page appears with the new user added.
Note
The new user’s password must be recorded and stored in a safe place. This helps prevent loss or
theft of the password and possible unauthorized entry.
Modifying Users
Although any user type can modify their password and user description, only the administrator can
modify any other user’s information.
To modify user properties:
Step 1
From the Main Menu or the Primary Navigation bar, click Users.
The Manage User page appears.
Step 2
Step 3
Click the correct user name to display the Modify User page for that user.
Make the necessary changes to the password, user type (provided that you are logged in as the
Administrator), and the user’s description.
Step 4
Click Submit.
The Manage Users page appears with the modified user information.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Device Management
Deleting Users
Only the administrator can delete any other user that appears in the Manage Users page. You cannot
delete the default user, called bacadmin.
To delete a user:
Step 1
From the Main menu or the Primary Navigation bar, click Users.
The Manage User page appears.
Step 2
Step 3
Click the Delete icon ( ) corresponding to the user you want to delete.
The Delete User dialog box appears. Click OK.
The Manage Users page appears without the deleted user.
Device Management
Use the Devices menu to provision and manage TR-069 and TR-196 enabled devices. You can:
•
Search for a specific device or for a group of devices that share criteria that you specify. See
•
Add, modify, or delete devices in the RDU database. See:
–
–
•
View device data, such as configuration, properties, discovered data, and faults. See Viewing Device
•
•
•
•
Relate and unrelate any device to a specific group. See Relating and Unrelating Devices, page 16-13.
Perform various operations, such as an IP Ping, and live data retrieval, on the device to gain more
Manage Devices Page
The Manage Devices page appears when you click Devices on the Main menu or the Primary Navigation
bar. This page, shown in Figure 16-2, contains the fields and controls necessary to perform all device
management functions.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Device Management
Figure 16-2
Manage Devices Page
Searching for Devices
By using Cisco BAC, you can search for device information in a number of different ways.
To select the search type, from the Manage Devices page, click the Search Type drop-down list.
Subsequent search pages contain screen components that may be unique to the search type selected.
The Manage Device page utilizes two separate but related areas to generate search results that let you
perform many device management functions. These areas are the Search Type drop-down list that defines
which search to perform, and search value field, which qualifies the search type. You can perform these
searches:
•
Device Identifier Search—Searches by using the device ID. This search function supports wildcard
searching at the end of the search string. You can also look up a single device by providing a
complete device ID of a specific device.
•
FQDN Search—Searches by using the fully qualified domain name (FQDN) associated with the
device.
•
•
Group Search—Searches devices which are part of a particular group.
Owner ID search—Searches by using the owner ID associated with the device. The owner ID may
identify the service subscriber’s account number, for example. This search function does not support
wildcard searching.
•
•
•
Registered Class of Service Search—Searches by using the Class of Service that a device has been
provisioned with.
Related Class of Service Search—Searches by using both the registered and selected Class of
Service.
Selected Class of Service Search—Searches by using the Class of Service selected by the RDU for
a device that, for one reason or another, cannot retain its registered Class of Service.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Device Management
Some searches that you can perform allow the use of a wildcard character (*) to enhance the search
Table 16-1
Searches Supported for Device Management
Menu Search
Search Type Options
Device Identifier Search
Full Device Identifier or partial Device Identifier followed
by a wildcard asterisk (*) character at the end of the string.
For example, to search for a device with the ID
0010BF-ZAA001A00001, you can try 0010BF-*, but
searching by using *-ZAA001A00001 does not yield results.
FQDN Search
Full FQDN or partial FQDN string beginning with an
wildcard asterisk (*) character.
For example, to search for a device with the FQDN
IGW-1234.ACME.COM, you can try:
•
•
•
*.acme.com
*.com
*
Group Search
Group Name (Group Type)
Drop-down list
•
Full Device Identifier or partial Device Identifier followed
by a wildcard asterisk (*) character at the end of the string.
Owner ID Search
Owner ID
Wildcard searches are not supported. You must enter the
complete owner ID.
Registered Class of Service Search
Related Class of Service Search
Selected Class of Service Search
Class of Service (Type)
•
Drop-down box
Class of Service (Type)
Drop-down box
Class of Service (Type)
Drop-down box
•
•
In addition, a Page Size drop-down lets you limit the number of search results displayed per page. You
can select 25, 50, or 75 results for display. When the number of search results is greater than the selected
page size, paging controls appear in the lower left corner of the page. These controls let you scroll
forward or backward one page at a time, or to select a specific page.
Note
A maximum of 1,000 results are returned for any query, with a maximum of 75 results displayed per
page. You can change the default maximum by modifying the /adminui/maxReturned property, in the
BPR_HOME/rdu/conf/adminui.properties file, and then running the bprAgent restart tomcat
command (located in the /etc/init.d/ directory) to restart the Cisco BAC Tomcat component.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Device Management
Device Management Controls
These buttons are located directly below the search function fields and are generally used in conjunction
with the search function. For example, you might search for devices belonging to a specific group of
devices in order to perform some sort of management function. The following buttons are available,
although each management function may not be available depending on the search type used.
Add
The Add button lets you add a new device to the RDU database. See Adding Device Records, page 16-11,
for the appropriate instructions.
Delete
The Delete button lets you delete any selected device(s) from the RDU database. See Deleting Device
Records, page 16-11, for the appropriate instructions.
Regenerate
Use the Regenerate button to force immediate regeneration of instructions for selected device(s).
Relate
The Relate button lets you associate a device (by using its Device ID) with a specific group (referred to
as Node in the API).
Unrelate
The Unrelate button cancels the relationship between a selected device and the group that the device is
currently related to.
Searching for devices returns results under the following headings or links that appear on the page:
Identifier
Identifies all devices matching the search criteria. Each of the identifiers displayed has a link to another
page from which you can modify the device.
Device Type
Displays the available device type; in this case, CWMP.
Details
additional information.
Operations
Displays a drop-down list of available device operations. See Performing Operations on Devices,
page 16-14, for additional information.
Viewing Device Details
You can view the details of any device identified in the search results.
To view any device details, click the View Details icon ( ) corresponding to the device you want to
view, and the Device Details page appears.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Device Management
Figure 16-3 provides a sample Device Details page.
Figure 16-3 Device Details Page
Table 16-2
Device Details Page
Field or Button
Device Details
Device Type
DeviceID
Description
Identifies the device type.
Identifies the device identifier.
FQDN
Identifies the fully qualified domain name for the selected
device. For example, IGW-1234.ACME.COM is a fully
qualified domain name.
Host Name
Identifies the host. For example, in the FQDN description
above, IGW-1234 is the hostname.
Domain Name
Identifies the domain within which the host resides. For
example, in the FQDN description above, ACME.COM is the
domain name.
Provisioning Group
Identifies the provisioning group to which the device has been
pre-assigned or assigned automatically.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-8
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Device Management
Table 16-2
Device Details Page (continued)
Description
Field or Button
Home Provisioning Group
Identifies the provisioning group to which the device should
belong.
Old Provisioning Group
CPE Password
Identifies the provisioning group to which the device was
earlier belonging.
Identifies the password used to authenticate the device when
establishing a connection to Cisco BAC. This password is used
only for HTTP-based authentication of the customer premises
equipment (CPE).
For security purposes, it returns a string with asterisk (*)
characters regardless of the actual value unless the password
has not been set, in which case an empty value is displayed.
Connection Request User Name
Connection Request Password
Identifies the username used to authenticate a
ConnectionRequest from Cisco BAC to the CPE.
Identifies the password used to authenticate a
ConnectionRequest from Cisco BAC to the CPE. For security
purposes, this parameter returns an empty string regardless of
the actual value.
Device Properties
Identifies any properties, other than those that appear on this
page, that can be set for this device. This field includes the
display of custom properties.
Registered Class of Service
Identifies the Class of Service assigned to this device. If a
different Class of Service has been selected for the device by
extension, an additional field with Selected Class of Service
appears.
Owner Identifier
Identifies the device. This may be a user ID, and account
number, or may be blank.
Note
The owner identifier is an alpha numeric field which
can also contain the special characters ($, @, !, ~, &,
%, ^, #, *, -, _, ., +, = etc.).
CPE Configuration Revision
Identifies the configuration rules revision number, which is set
for the device ParameterKey following a successful
configuration synchronization.
CPE Firmware Rule Revision
Identifies the firmware rules revision for this CPE.
Related Group Name (Group Type)
Identifies the group(s) name and type to which this device is
information.
Troubleshooting
Identifies if CPE troubleshooting is enabled or disabled.
Note
If troubleshooting is enabled, a View Troubleshooting
Log link appears on this page.
View Device History Details
Registration On
Provides a link to the history of configuration changes on the
CPE.
The time stamp when the device is registered with RDU.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-9
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Device Management
Table 16-2
Device Details Page (continued)
Field or Button
Description
Discovered Parameters
Note
This section includes any parameters discovered from the device. This section does not appear
unless discovered parameters are available for the device. For details on how to configure
Has Routable IP Address
Identifies if a device is generally reachable; that is, if the
source IP address of the last request was the same as the WAN
IP address reported by the CPE in the Inform message.
Inform.DeviceId.Manufacturer
Inform.DeviceId.ManufacturerOUI
Inform.DeviceId.ProductClass
Identifies the manufacturer of the CPE reported in the last
Inform message.
Identifies the unique identifier of the manufacturer of the CPE
reported in the last Inform message.
Identifier a manufacturer’s product or class of product over
which the SerialNumber parameter is unique. The device
reports this parameter in the Inform message.
InternetGatewayDevice.DeviceInfo. Identifies the hardware version of the CPE.
HardwareVersion
InternetGatewayDevice.DeviceInfo. Identifies the model name of the CPE.
ModelName
InternetGatewayDevice.DeviceInfo. Identifies the software version currently installed on the CPE.
SoftwareVersion
The software version is also known as firmware version.
InternetGatewayDevice.
ManagementServer.ParameterKey
Specifies the value of the ParameterKey reported by the device
in the last Inform message or last set by the DPE, whichever
occurred last.
Faulty Device List
Note
This information is displayed only if faults occur at the devices. For more information, see
Last Fault Time
Specifies the date and time that a recurring fault occurred for
this device.
Location
Specifies the server on which this fault occurred.
Provides a description of the recurring fault.
Fault Description
Managing Devices
The Devices menu lets you add devices to the RDU databases and update preprovisioned data. Device
management includes:
•
•
•
Adding, deleting, and modifying RDU device records
Regenerating instructions
Relating selected devices to management objects, such as Provisioning Group, Class of Service,
Group, and so on.
•
Executing operations on devices. These operations are actually performed on the device and include:
–
Reboot
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-10
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Device Management
–
–
–
–
–
–
Request Connection
Factory Reset
Display Live Data
Ping Diagnostic
Force Firmware Upgrade
Force Configuration Synchronization
This section describes how to perform the various device management functions on new or existing
devices.
Adding Device Records
To add a device record:
Step 1
From the Manage Devices page, click Add.
The Add Device page appears.
Step 2
Step 3
Choose the device type and Class of Service, and complete the other fields on the page.
In addition to the fields described earlier in this section, you can optionally add new values for existing
property name/value pairs.
•
•
Property Name—Identifies the name of the custom or built-in device property.
Property Value—Identifies the value of the property.
To add the property, click Add.
Step 4
Click Submit to add the device, or Reset to clear all fields.
Modifying Device Records
To modify a device record:
Step 1
From the Manage Devices page, click the Identifier link corresponding to the correct device.
The Modify Device page appears.
Step 2
Step 3
Enter the data in the correct field. You can modify any existing property name/value pairs by clicking
Add, or delete any of them by clicking the Delete button.
Click Submit to save the changes made to this device, or Reset to clear all fields.
Deleting Device Records
Deleting device records is a simple process, but one that you should use carefully. To undo the delete,
you must restore a previously backed up database or re-add the device.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-11
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Device Management
Note
becomes necessary.
To delete a device record:
Step 1
From the Manage Devices page, locate the device that you want to delete. You can use one of the search
types for this purpose.
Step 2
Step 3
Select the check box associated with the correct device.
Click Delete.
The device record stored in the RDU database is removed.
Viewing Device History
To view the history of a device configuration:
Step 1
Step 2
From the Manage Devices page, locate the device whose history you want to view. You can use one of
the search types for this purpose.
Click the View Details icon corresponding to the device.
The Device Details page appears.
Step 3
Against View Device History Details, click the View Details icon.
The Device History Details page appears.
Regenerating Device Instructions
The Regenerate button or API operation force immediate regeneration of instructions for the device.
These instructions are sent to the DPEs in the device's provisioning group. Normally, the process of
regenerating the instruction is automatically triggered following changes to device, Class of Service, or
other such impacting changes.
However, after a change to a Class of Service, the system takes time to regenerate instructions for all
devices. This button can be used to expedite regeneration of instructions for a given device. This may be
desirable during proactive troubleshooting.
Device instructions are automatically regenerated whenever:
•
•
•
•
•
•
A file related to a Class of Service, that is, a template, is updated.
The default Class of Service for a device type is changed.
The provisioning group object is changed using the administrator user interface or the API.
The Class of Service object properties are changed.
The DPE sends a configuration regeneration request to the RDU.
The device properties or relationship is updated.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-12
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Device Management
Some instructions cannot be automatically regenerated because the Cisco BAC system cannot determine
if the change impacts device instructions. In such cases, you must manually regenerate instructions by
using the generationConfiguration()method or the administrator user interface. Instructions that
must be manually regenerated are those that become necessary whenever:
•
•
A technology default is changed.
The system defaults are changed.
Note
Regardless of how instructions are regenerated, they are not propagated to the devices until the device
configuration is activated, that is, the device contacts the DPE either on schedule or as a result of a
connection request initiated from the DPE.
Relating and Unrelating Devices
You can define any number of arbitrary groups. The Relate function lets you associate a device to a
specific group, which is in turn associated with a specific group type.
Relating a Device to a Group
Note
You can relate devices to groups only one by one using the administrator user interface.
To relate a device to a group:
Step 1
Step 2
From the Manage Devices page, locate the device which you want to relate to a group. You can use one
of the search types for this purpose.
Check the check box corresponding to the device Identifier, and click the Relate button.
The Relate Device to Group(s) page appears.
Step 3
Select the Group Type from the drop-down list and the Group(s) from the list of defined groups.
Note
To select multiple groups from the Group list, press Control or Shift.
Step 4
Click Submit.
The Manage Devices page appears.
To verify whether the device has been added to the group, click the View Details icon corresponding to
the device. On the Device Details page that appears, check the status against Related Group Name
(Group Type).
Unrelating a Device from a Group
Note
You can relate devices to groups only one by one, using the administrator user interface.
To unrelate a device to a group:
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-13
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Device Management
Step 1
Step 2
From the Manage Devices page, locate the device which you want to unrelate from a group.
Check the check box corresponding to the device Identifier, and click the Unrelate button.
The Unrelate Device from Group page appears.
Step 3
From the list of defined Group(s), select the group(s) from which you want to unrelate the device.
Note
To select multiple groups from the Group list, press Control or Shift.
Step 4
Click Submit.
The Manage Devices page appears.
Searching Devices in a Group
To search for devices belonging to a particular group:
Step 1
Step 2
From the Manage Devices page, select the Group Search option from the drop-down list under Search
Type.
The Group Name (Group Type) and the Device Identifier options appear.
From the Group Name (Group Type) drop-down list, select the Group Name of the devices that you want
to search.
Step 3
Step 4
Enter a device ID in the Device Identifier field, or use a wildcard (*).
Click Search.
The devices related to the group appears.
Performing Operations on Devices
You can perform the following functions from the Device Operations page:
•
Reboot—Enables you to reboot the device. This operation is primarily intended for diagnostic
purposes.
•
•
•
Request Connection—Instructs the device to establish a CWMP session with Cisco BAC.
Factory Reset—Enables you to reset a preregistered device settings to its original factory settings.
Display Live Data—Enables you to view live device parameter values.
You can choose the parameters that you want to view for this device operation by selecting from the
options under the Parameter List File drop-down box. Each parameter list is an XML file that details
the parameters each file will return; click the View Details icon to view the parameters.
You can also define the parameters that you want to be retrieved in parameter lists. Cisco BAC
provides a sample list of live data templates which specify various parameters to be read during a
view live data query.
•
Ping Diagnostic—Enables you to perform an IP ping diagnostics test from the device to any host.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-14
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Device Management
Note
For all of the above operations, if the device is not reachable, an error message appears.
•
•
Force Firmware Upgrade—Enables you to force a device to update its firmware on next contact
regardless of the MaintenanceWindow restrictions set in the firmware rules.
Force Configuration Synchronization—Enables you to force an individual device to synchronize its
configuration regardless of the current configuration version on the device.
Note
The operations forcing a firmware upgrade or a configuration synchronization take effect on the next
device contact with the autoconfiguration server (ACS).
Performing a Reboot
To reboot the device:
Step 1
Step 2
From the Devices > Manage Devices page, locate the correct device.
Click the Operations icon ( ) corresponding to the device.
The Device Operations page appears.
Step 3
Step 4
From the drop-down list under Device Operation, select Reboot.
Click Submit.
Performing a Request Connection
To force the device to initiate a connection request:
Step 1
Step 2
From the Devices > Manage Devices page, locate the correct device.
Click the Operations icon corresponding to the device.
The Device Operations page appears.
Step 3
Step 4
From the drop-down list under Device Operation, select Request Connection.
Click Submit.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-15
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Device Management
Performing a Factory Reset
To reset device settings to its original factory settings:
Step 1
Step 2
From the Devices > Manage Devices page, locate the correct device.
Click the Operations icon corresponding to the device.
The Device Operations page appears.
Step 3
Step 4
From the drop-down list under Device Operation, select Factory Reset.
Click Submit.
Displaying Live Data
To display parameters from a device:
Step 1
Step 2
From the Devices > Manage Devices page, locate the correct device.
Click the Operations icon corresponding to the device.
The Device Operations page appears.
Step 3
Step 4
Step 5
From the drop-down list under Device Operation, select Display Live Data.
Enter a duration in seconds for the operation to time out. The default timeout is 90 seconds.
From the Parameter List File drop-down list, select the file, each of which is an XML file that details the
parameters that are returned.
Step 6
Click on the View Details icon to view the parameters.
Note
You can also view these sample templates under the Configuration > Files tabs. From the View
Files page, select the Parameter List option under the File Type drop-down list. Click Search. A
list of sample parameter list files appears.
Step 7
Click Submit.
Note
If the device is not reachable, an error message appears.
Performing a Ping Diagnostic
To perform a ping operation to a device by using its IP address:
Step 1
Step 2
From the Devices > Manage Devices page, locate the correct device.
Click the Operations icon corresponding to the device.
The Device Operations page appears.
Step 3
Step 4
From the drop-down list under Device Operation, select Ping Diagnostic.
Enter values in the following fields:
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-16
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Device Management
•
Device operation timeout (in seconds)—Specifies the duration after which the Ping operation times
out.
•
•
•
•
•
•
Name of the hostname to be pinged—Identifies the hostname of the CPE to be pinged.
Interface—Identifies the WAN interface from which the Ping should originate on the CPE.
Number of repetitions—Specifies the number of times the Ping operation should run.
Time out—Specifies the timeout for the Ping packet.
Data block size—Specifies the size of each Ping packet.
DSCP—Specifies the DSCP value in each Ping packet.
Step 5
Click Submit.
Forcing a Firmware Upgrade
To force a firmware upgrade on a device on next contact and bypassing the MaintenanceWindow
restrictions set in the firmware rules:
Step 1
Step 2
From the Devices > Manage Devices page, locate the device whose configuration you want to
synchronize.
Click the Operations icon corresponding to the device.
The Device Operations page appears.
Step 3
Step 4
From the drop-down list under Perform Device Operation, select Force Firmware Upgrade.
Click Submit.
Forcing a Configuration Synchronization
To force a device to synchronize its configuration on next contact with the DPE regardless of the current
configuration version on the device:
Step 1
Step 2
From the Devices > Manage Devices page, locate the device whose configuration you want to
synchronize.
Click the Operations icon corresponding to the device.
The Device Operations page appears.
Step 3
Step 4
From the drop-down list under Perform Device Operation, select Force Configuration
Synchronization.
Click Submit.
The device configuration is synchronized with the DPE.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-17
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Group Management
Setting Device Operations Timeout
You can set the duration within which an operation is to be executed on device. After that period, the
operation times out.
Note
In addition to the procedure described in this section, you can set the default timeout duration in the
Device Operation Timeout field using Configuration > Defaults > CWMP Defaults.
To set the timeout value for a device operation:
Step 1
Step 2
From the Devices > Manage Devices page, locate the correct device.
Click the Operations icon corresponding to the device.
The Device Operations page appears.
Step 3
Step 4
From the drop-down list under Device Operation, select the operation you want to perform.
Enter a value (in seconds) in the Device Operation Timeout field. The default value for a device
operation to time out is 90 seconds.
Step 5
Click Submit.
Group Management
Group management allows the creation, modification, and deletion of groups and group types.
Note
Group priorities in the property hierarchy (see Property Hierarchy, page 4-4) are handled through group
types.
Managing Group Types
or the primary menu bar. Group Type is the default setting when this page appears.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-18
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Group Management
Figure 16-4
Manage Groups Page
Adding a Group Type
To add a new group type:
Step 1
Step 2
Step 3
Click the Groups tab to open the Manage Groups page.
Change the Search Type to Group Type.
Figure 16-5
Add Group Type Page
Step 4
Step 5
Enter a name for the group type.
Enter the priority value for the group type.
The value can range from 1 through 100, with 1 as the highest priority. For example, if the priority values
of two member groups are 5 and 20, respectively, then the group with priority value 5 has more priority
than the group with priority value 20.
The Group Type Priority is, by default, set to 50.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-19
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Group Management
If two member groups have the same priority value, the group type names are sorted in alphabetical order
to decide the priority. If this results in two member groups with the same priority, they are sorted based
on the group names.
Step 6
Click Submit.
The new group type is recorded in the RDU, and the new group type appears on the Manage Group Types
page.
Modifying Group Types
To modify group type priority:
Step 1
Step 2
Step 3
Step 4
Step 5
Click the Groups tab to open the Manage Groups page.
Change the Search Type to Group Type.
Click the name of the group type to open the Modify Group Type page.
Make the necessary changes to the Group Type Priority.
Click Submit.
The Manage Groups page appears with the modified description.
Deleting Group Types
To delete group types:
Step 1
Step 2
Step 3
Click the Groups tab to open the Manage Groups page
Locate the correct group type and click the Delete icon ( ) corresponding to it.
In the Delete Group Type dialog box, click OK to delete the selected group type, or Cancel to return to
the previous page.
The Manage Groups page appears without the deleted Group Type.
Managing Groups
You can create and modify groups, and delete unwanted groups.
Adding a New Group
To add a new group:
Step 1
Step 2
Select Group from the drop-down list on the Manage Groups page.
Click Add.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-20
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Group Management
Figure 16-6
Add Group Page
Step 3
Enter the name for the new group.
Group name can contain alphanumeric characters and other characters such as, underscore (_), hyphen
(-) , period (.), colon (:), and at sign (@) characters. The group name is validated against these characters.
If the group name contains characters other than these, Add Group operation fails.
Step 4
Step 5
Select the appropriate Group Type from the drop-down list.
In addition to the above fields, you can optionally add new values for existing property name/value pairs.
–
–
Property Name - Identifies the name of the custom or built-in device property.
Property Value - Identifies the value of the property.
To add the property, click Add
Step 6
Click Submit to add the device, or Reset to clear all fields.
Modifying a Group
To modify group properties:
Step 1
Step 2
Select Group from the drop-down list on the Manage Groups page.
Select the group that needs to be modified from the group list.
The Modify Group page appears.
Step 3
Make the necessary changes and Click Submit.
The Manage Group page appears with the appropriately modified description.
Deleting Groups
You can delete any group that appears in the Manage Groups page by checking the box corresponding
to the correct group and clicking the Delete button.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-21
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Viewing Servers
Relating/Unrelating Groups to Groups
The relate and unrelate functions are used to establish a relationship between group objects. To either
relate or unrelate this relationship:
Step 1
Click Relate or Unrelate, as desired, for the selected group.
The Relate Group or the Unrelate Group page appears.
Step 2
Step 3
Select the appropriate Group Type from the drop-down list and select the group to which the node will
be related/unrelated.
Click Submit.
The Manage Groups page appears.
Viewing Group Details
To view details of a group:
Step 1
Step 2
Step 3
Step 4
From the Manage Groups page, select the Group option from the Search Type drop-down list.
Select the correct Group Type and enter the Group or Group wildcard in the appropriate field.
Click Search.
Click the link corresponding to the Group whose details you want to view.
The Modify Group page appears, with details of the Group Name and Group Type.
Viewing Servers
This section describes the Cisco BAC server pages:
•
•
•
Viewing Device Provisioning Engines
The Manage Device Provisioning Engines page lets you monitor the list of all DPEs currently registered
with the Cisco BAC database. Each DPE name displayed on this page is a link to another page that shows
the details for that DPE. Click this link to display the details page, which is similar to Figure 16-7.
Note
The RDU determines the names of the DPEs by performing a reverse DNS lookup on the DPE interfaces
through which the DPE contacts the RDU.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-22
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Viewing Servers
Figure 16-7
View Device Provisioning Engine Details Page
Table 16-3
View Device Provisioning Engine Details Page
Field or Button
Description
Device Provisioning Engine Details
Host Name
Port
Identifies the DPE hostname.
Identifies the DPE port number from which DPE established connection to
the RDU.
IP Address
Identifies the IP address of the DPE.
Primary Provisioning
Group(s)
Identifies the primary provisioning group that the selected DPE belongs to.
This is an active link that, if clicked, displays the Provisioning Group Details
page for that provisioning group.
Properties
Version
Identifies which properties have been configured for this DPE.
Identifies the version of DPE software currently in use.
UpTime
Specifies the total time that the DPE has been operational since its last
start-up.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-23
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Viewing Servers
Table 16-3
View Device Provisioning Engine Details Page (continued)
Field or Button
Description
State
Identifies whether the DPE is ready for operations. These states include:
•
•
•
•
•
•
Registering
Initializing
Synchronizing
Populating
Ready
Offline
If this field reads Offline, the options from the Uptime field onwards do not
appear. The DPE is prepared to service client requests in any state except
Offline.
Device with Faults
Displays number of devices with faults at this DPE. If number is greater than
zero, features the View Details icon which if clicked, displays details of
devices with faults.
Log Files
DPE Log File
Features the View Details icon that if clicked displays the View Log File
Contents page, which provides details of dpe.log.
Files
Identifies the number of files, such as firmware images, that are cached at
the DPE.
Number of Devices
Identifies the number of CWMP devices for which the DPE maintains
instructions. In a fully synchronized DPE, this number should equal the
number of CWMP devices in the DPE’s provisioning group.
CWMP Statistics
Note
This section displays statistics from the last time the DPE was started.
Sessions succeeded
Sessions failed
Identifies the number of successful CWMP sessions.
Identifies the number of failed CWMP sessions.
File Requests Succeeded Identifies the number of successful firmware file download requests.
File Requests Failed
Identifies the number of failed firmware file download requests.
Identifies the number of immediate device operations that succeeded.
Immediate Device
Operations Succeeded
Immediate Device
Operations failed
Identifies the number of immediate device operations that failed.
Home PG Redirection Statistics
Succeeded
Failed
Identifies the number of successful home provisioning group redirections.
Identifies the number of failed home provisioning group redirections.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-24
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Viewing Servers
Viewing Network Registrar Extension Point Details
The NRs option, from the Servers menu, displays the current values for the network registrar extension
Figure 16-8
View Netwrok Registrar Extension Point Details Page
Table 16-4
View Network Registrar Details Page
Field or Button
Description
Netwrok Registrar Details
Host Name
Identifies the hostname of the system that is running the regional distribution
unit.
IP Address
Identifies the IP address assigned to the NR.
Provisioning Group
Identifies the primary provisioning group that the selected NR belongs to.
This is an active link that, if clicked, displays the Provisioning Group Details
page for that provisioning group
Properties
Version
Identifies properties configured for the NR.
Specifies the version of NR software currently in use.
UpTime
Specifies the total time that the NR has been operational since its last period
of downtime.
State
Identifies whether the NR is ready to respond to requests. The only state that
is featured using the administrator user interface is Ready.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-25
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Viewing Servers
Viewing Provisioning Groups
The Manage Provisioning Groups page lets you monitor all current provisioning groups. Each
provisioning group appearing in this list is a link to its own details page. Click this link to display the
Figure 16-9
View Provisioning Group Details Page
Table 16-5 identifies the fields and buttons shown in Figure 16-9. The fields described in Table 16-5 may
include active links that, if clicked, display the appropriate details page.
Table 16-5
View Provisioning Groups Details Page
Field or Button
Description
Provisioning Group Details
Name
Identifies the provisioning group name selected from the List Provisioning
Groups page.
Primary Device
Identifies the hostnames of the DPEs that are primary for this provisioning
Provisioning Engine(s) group.
Provisioning Group Properties
Discovered ACS URL
Identifies the DPE URL through which the provisioning group connects to
the DPE. Discovered URL is based on DPE interface configured for
provisioning operations using the DPE CLI.
The parameters is based on registration information from the DPE which
registered last with the RDU. This URL is used for operations such as
redirection of CPE to a different provisioning group.
LeaseQuery Servers V4 The list of Cisco Network Registrar servers that are registered for this
provisioning group.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-26
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Viewing Servers
Table 16-5
View Provisioning Groups Details Page (continued)
Field or Button
Description
Identifies the configured URL of the Cisco BAC server associated with each
ACS URL (Overrides
Discovered ACS URL) provisioning group. This URL is used by devices to contact the DPEs in a
given provisioning group, and is used for operations such as redirection of
CPE to a a different provisioning group.
Submit
Reset
Activates or implements the changes you have made.
Returns all settings to their previous settings.
Viewing Regional Distribution Unit Details
The RDU option, from the Servers menu, displays details of the RDU. Figure 16-10 illustrates a sample
RDU details page.
Figure 16-10
View Regional Distribution Unit Details Page
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-27
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Viewing Servers
Table 16-6
View RDU Details Page
Field or Button
Description
Regional Distribution Unit Details
Host Name
Identifies the host name of the system that is running the regional
distribution unit.
Port
Identifies the RDU listening port number for connections from the DPEs.
The default port number is 49187, but a different port can be selected during
installation of the RDU.
IP Address
Properties
Version
Identifies the IP address assigned to the RDU.
Identifies properties configured for the RDU.
Specifies the version of RDU software currently in use.
UpTime
Specifies the total time that the RDU has been operational since its last
period of downtime.
State
Identifies whether the RDU is ready to respond to requests. The only state
that is featured using the administrator user interface is Ready.
PACE Statistics
Batches Processed
Identifies how many individual batches have been processed since the last
RDU start-up.
Batches Succeeded
Identifies how many individual batches have been successfully processed
since the last RDU start-up.
Batches Dropped
Batches Failed
Identifies how many batches have been dropped since the last RDU start-up.
Identifies how many batches have failed processing since the last RDU
start-up.
Average Processing
Time
Identifies the average time, in milliseconds, that it takes to process the batch
excluding the time it spends in the queue if RDU is too busy.
Average Batch
Processing Time
Identifies the average time, in milliseconds, that it takes to process the batch
including the time it spends in the queue if RDU is too busy.
IGS
This is the Instruction Generation Service.
State
Identifies the operational state of the instruction generation service. This
could be:
•
•
Idle—Specifies that the IGS is not processing regeneration requests.
Regeneration—Specifies that the IGS is processing regeneration
requests.
•
Waiting Regeneration—Specifies that the IGS is unable to regenerate
instructions for a device. When the IGS is stuck in this state, consult the
rdu.log for details.
Requests Processed
Identifies the number of instruction generation requests processed since last
RDU start-up.
Elapsed Time
Identifies, in seconds, the time elapsed since the start of regeneration.
Devices Regenerated
Identifies the number of device instructions regenerated since the
regeneration process started.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-28
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Viewing Servers
Table 16-6
View RDU Details Page (continued)
Description
Field or Button
Regeneration rate
Identifies the cumulative rate of device instructions regenerated since the
regeneration process started.
Requests pending
Log Files
Identifies the number of regeneration requests in queue.
RDU Log File
Features the View Details icon, that, if clicked, displays the View Log File
Contents page, which provides details of the rdu.log file.
Audit Log File
Features the View Details icon, that, if clicked, displays the View Log File
Contents page, which provides details of the audit.log file.
Device Statistics
Number of CWMP
Devices
Identifies the number of devices in the RDU database.
Device Faults Statistics
Devices with Faults in Identifies the number of devices with faults over the last one hour, at both the
Last 1 Hour(s) RDU and the DPEs.
Devices with Faults in Identifies the number of devices with faults over the last three hours, at both
Last 3 Hour(s) the RDU and the DPEs.
Devices with Faults in Identifies the number of devices with faults over the last 12 hours, at both the
Last 12 Hour(s) RDU and the DPEs.
Devices with Faults in Identifies the number of devices with faults over the last 72 hours, at both the
Last 72 Hour(s) RDU and the DPEs.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-29
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 16 Using the Administrator User Interface
Viewing Servers
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
16-30
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
17
Configuring Broadband Access Center
This chapter describes the Cisco Broadband Access Center (BAC) configuration tasks that you perform
by selecting the options in the Configuration menu.
This chapter includes the following sections:
•
•
•
•
•
•
•
Configuring the Class of Service
By using the Cisco BAC administrator user interface, you can configure the Classes of Service offered
to your customers. You can use the administrator user interface to add, modify, view, or delete any
Figure 17-1
Manage Class of Service Page
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Configuring the Class of Service
Table 17-1
Manage Class of Service Page
Field or Button
Class of Service
Class of Service
Description
A drop-down list that identifies the technology classes of service that you
can search for. Available selections, as they appear on screen, include:
•
CWMP.
For additional information on these areas of technology, see
Note
Add
Lets you add a new Class of Service.
Class of Service
Class of Service list
Delete
Displays the names of Class of Service objects.
Lets you delete selected Classes of Service.
Table 17-2 identifies the fields and buttons shown in the Add Class of Service page.
Table 17-2
Add Class of Service Page
Field or Button
Description
Class of Service Name and Type
Class of Service Name
Class of Service Type
Lets you enter the name of the new Class of Service.
A drop-down list that identifies the types of Classes of Service that you can
select.
Configuration Template A drop-down list that identifies the configuration template file that you
File
associate with a Class of Service.
Firmware Rule File
A drop-down list that identifies the firmware rules file that you associate
with a Class of Service.
Property Name/Value
Property Name
Specifies the appropriate property. You can select the correct property from
the drop-down list.
Property Value
Specifies the value for the property name. You can select the correct value
from the drop-down list.
Add
Adds the new Property Name:Property Value pair to create the new Class of
Service.
Submit
Reset
Activates or implements the changes you have made.
Returns all settings to their previous settings.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Configuring the Class of Service
Adding a Class of Service
To add a specific Class of Service:
Step 1
Step 2
Step 3
Choose Configuration on the Primary Navigation bar.
Choose Class of Service from the Secondary Navigation bar.
Click Add.
The Add Class of Service page appears. This page identifies the various settings for the selected Class
of Service.
Step 4
Enter the name of your new class of service.
For example, assume that you want to create a new Class of Service called Gold-Classic for CWMP. You
might enter provisioned-cwmp as the Class of Service Name, and choose CWMP from the service type
drop-down list.
Step 5
Step 6
Step 7
Choose a Configuration Template File. For example, choose sample-cwmp-config.xml from the
configuration file template drop-down list.
Choose also a Firmware Rule File. For example, choose sample-cwmp-firmware-rules.xml from the
firmware rule file drop-down list.
Enter a Property Name and Property Value in the appropriate fields. This lets you configure standard or
custom properties for this class of service object.
For example, choose as property name /IPDevice/connectionRequestMethod. Choose Discovered from
the Property Value drop-down list and then continue with the rest of this procedure.
Note
The API constant for /IPDevice/connectionRequestMethod is
IPDeviceKeys.CONNECTION_REQUEST_METHOD.
Multiple Property Name:Property Value pairs could appear on this page. You use the Delete
button to remove any unwanted pairs from the class of service.
Step 8
Step 9
Click Add to add the property to the defining Class of Service.
Click Submit to finalize the process or Reset to return all fields to their previous setting.
After submitting the Class of Service, the Manage Class of Service page appears to show the newly
added Class of Service.
Modifying a Class of Service
You can modify the Classes of Service by selecting the various properties and assigning appropriate
property values. When creating a Class of Service for the first time you select all of the appropriate
properties and assign values to them.
If you make a mistake, or your business requirements for a certain Class of Service change, you can
either change the property value before submitting your previous changes or delete the Property
Name:Property Value pair altogether.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Configuring the Class of Service
Note
Changes to the Class of Service object trigger the Instruction Generation Service (IGS) to regenerate
instructions for all affected devices and send instructions to the DPEs. IGS does this task as a background
job. The status of the IGS can be observed using the View RDU Details page.
To add, delete, or modify Class of Service properties:
Step 1
Step 2
Step 3
Step 4
Choose Configuration on the Primary Navigation bar.
Choose Class of Service from the Secondary Navigation bar.
Choose the Class of Service to be modified.
Click the link corresponding to the correct Class of Service.
The Modify Class of Service page appears; note that the selected Class of Service name and type appear
below the page description.
•
To add a new property to the selected Class of Service:
–
Select the first property that you want assigned to the selected Class of Service, from the
Property Name drop-down and then, after choosing the appropriate value for that property, click
Add.
–
Repeat for any other properties you want to assign to the selected Class of Service.
•
•
To delete a property for the selected Class of Service:
–
–
Locate the unwanted property in the list immediately above the Property Name drop-down.
Click the Delete button.
To modify the value currently assigned to a property:
–
–
Delete the appropriate property as described above.
Add the same property back to the Class of Service while entering the new Property Value.
Note
If you delete a property that is required for your business process, you must add it back, and
select the appropriate value, before you submit the change.
Step 5
Step 6
Click Submit to make the modifications to the class of service.
Each property added to a Class of Service, appears when you click Submit. After doing so, a
confirmation page appears to regenerate the instructions for the devices with the selected Class of
Service.
Click OK.
The modified Class of Service will be available in the Manage Class of Service page.
Deleting a Class of Service
You can delete any existing Class of Service but, before you attempt to do so, you must ensure that there
are no devices associated with that Class of Service.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Configuring Custom Properties
Tip
Where there are large numbers of devices associated with a Class of Service to be deleted, use the Cisco
BAC application programmers interface (API) to write a program to iterate through these devices to
reassign another Class of Service to the devices.
To delete a Class of Service:
Step 1
Step 2
Step 3
Choose Configuration on the Primary Navigation bar.
Choose Class of Service from the Secondary Navigation bar.
Click the Delete icon ( ) for the correct Class of Service, and a confirmation dialog box appears.
Note
A Class of Service cannot be deleted if devices are associated with it or, if it is designated as the
default Class of Service. Therefore, you cannot delete the unprovisioned-cwmp Class of
Service object.
Step 4
Click OK to delete the file, or Cancel to return to the Manage Class of Service page. (See Figure 17-1.)
If you try to delete a Class of Service with devices associated with it, this error message is displayed:
The following error(s) occurred while processing your request.
Error: Class Of Service [sample-COS] has devices associated with it, unable to delete
Please correct the error(s) and resubmit your request.
The specific Class of Service is specified within the error message. In this example this is represented
by sample-COS.
Configuring Custom Properties
Custom properties let you specify additional customizable device information to be stored in the RDU
database. The Custom Property configuration page is found under the Configuration menu, and you use
this page to add or delete custom properties.
Caution
Although you can delete custom properties if they are currently in use, doing so could cause extreme
difficulty to other areas where the properties are in use.
After the custom property is defined, you can use it in this property hierarchy. See Authoring
Configuration Templates, page 5-14, for how to use the property hierarchy. Properties can be configured
on the following objects for use in the property hierarchy:
•
•
•
•
Device
Group
Provisioning Group
Class of Service
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Configuring Defaults
•
•
Device Type
System defaults
Group priorities in the property hierarchy (see Property Hierarchy, page 4-4) are handled through group
types.
Step 1
Step 2
Choose Configuration on the Primary Navigation bar.
Choose Custom Property on the Secondary Navigation bar,
The Manage Cisco BAC Custom Properties page appears.
•
To add a custom property:
a. Click Add on the Manage Cisco BAC Custom Properties page,
The Add Custom Property page appears.
b. Enter the name of the new custom property.
c. Choose a custom property value type from the drop-down list.
d. Click Submit when complete.
After the property has been added to the administrative database, the Manage Cisco BAC Custom
Properties page appears.
•
To delete a custom property:
a. Identify the custom property to be deleted from the Manage Cisco BAC Custom Properties page.
b. Click the Delete icon corresponding to the correct custom property,
The custom properties deletion dialog box appears.
c. Click OK to delete the custom property.
Configuring Defaults
The Defaults page, found under the Configuration option, lets you access the default settings for the
overall system, including the Regional Distribution Unit (RDU), and the CWMP technology.
Selecting Configuration Options
The procedure for configuring specific default types is identical. Complete this procedure to access the
desired defaults page and then refer to the appropriate section within this chapter for a description of the
various page components.
Step 1
Step 2
Choose Configuration on either the Primary Navigation bar or Main Menu page.
Choose Defaults from the Secondary Navigation bar.
The Configure Defaults page appears.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Configuring Defaults
Step 3
Choose the correct default type from the list to the left of the screen.
The appropriate defaults page appears.
CWMP Defaults
Figure 17-2 Configure CWMP Defaults Page
Table 17-3
Configure CWMP Defaults Page
Field or Button
Description
Configuration
Generation Extension
Point
Identifies the common extension points executed before any other
technology extension point is executed.
Activation Extension
Point
Identifies the extension point that activates a device.
Service Level Extension Identifies the extension point that determines what Class of Service to use
Point
for configuration generation and returns that information to the RDU.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Configuring Defaults
Table 17-3
Configure CWMP Defaults Page (continued)
Field or Button
Description
Default Class of Service Changes to the default Class of Service cause regeneration of instructions
for all devices associated with the default Class of Service.
The Instruction Generation Service (IGS) performs automatic regeneration
of instructions and distributes them to appropriate DPEs. Any other changes
made to this page do not affect the current devices.
Connection Request
Method
Identifies the method in which Cisco BAC attempts to perform a connection
request. You can choose to disable this feature by selecting the Disabled
option, or choose from:
•
•
•
•
•
•
Discovered
Use FQDN
Use IP
LeaseQuery
Annex G
Use CMHS
The selected method dictates how Cisco BAC determines the connection
request URL to be used to contact the device.
Connection Request
Path
Specifies the URL path based on the device IP address, using which the DPE
constructs the Connection Request URL.
Connection Request Port Specifies the device port number, using which the DPE constructs the
Connection Request URL.
Device Operation
Timeout
Specifies, in seconds, the time after which an operation on a device times out
Custom Discover
Parameters
Specifies the custom parameter(s) in comma-separated format that are to be
discovered from the device.
Custom Firmware
Changed Parameters
Specifies custom parameters that are to be checked if the device reported a
new firmware version.
Connection Request
Master Secret
Specifies the value that is used along with the device identifier to generate a
connection request password for a device, if autogeneration of connection
request password is enabled.
Signature Key Name
Specifies the name of the key that is used by the gateway to look up the
shared secret key. You must change the signature key name when the
signature secret is changed.
Signature Validity
Signature Secret
Specifies the number of seconds for which the signature is considered valid,
following the signature timestamp. The default value is 3600.
Specifies the secret that is used to compute the signature.
Secondary Device ID
CPE Parameter
Specifies the IMEI number of the device which is used as the secondary
device ID. It is stored in the device record in the RDU.
CMHS Server List
Custom Property
Specifies the CMHS custom property name.It is not a predefined and must
be specified.
Use Source Address For Check this box if you want to configure Cisco BAC to use the same source
Connection Request IP reported by the device.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-8
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Configuring Defaults
Table 17-3
Configure CWMP Defaults Page (continued)
Description
Field or Button
STUN Enabled
Check this box if you want the STUN server to be enabled for the device.
Specifies the STUN server address.
STUN Server Address
STUN Server Port
Specifies the STUN server port.
STUN HTTP Server Port Specifies the STUN server HTTP port.
STUN HTTP Server
User Name
Specifies the STUN server HTTP user name.
STUN HTTP Server
Password
Specifies the STUN server HTTP password
SOAP Request Sender
Extension
Specifies the script to be executed when the CPE sends a request to the DPE
SOAP Response Sender Specifies the script to be executed when the DPE sends a response to the
Extension CPE.
Incoming Event Viewer Specifies the script to be executed when the DPE receives an event of
Extension existing configuration from the CPE.
Outgoing Event Viewer Specifies the script to be executed when the DPE sends an event of required
Extension
configuration to the CPE.
SOAP Request Sender
Specifies the script to be executed when the unknown device sends a request
Extension for Unknown to the DPE.
Devices
Soap Response Sender
Extension for Unknown unknown device.
Devices
Specifies the script to be executed when the DPE sends response to the
Submit
Reset
Activates or implements the changes you have made.
Returns all settings to their previous settings.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-9
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Configuring Defaults
RDU Defaults
When you click the RDU defaults link, the RDU Defaults page (see Figure 17-3) appears. Use this page
to configure settings affecting RDU operations.
Figure 17-3
Configure RDU Defaults Page
Table 17-4
Configure RDU Defaults Page
Field or Button
Description
Configuration Extension Identifies the configuration extension executed before any other technology
Point
extension is executed.
Device Detection
Extension Point
Identifies the extension used to determine a device’s type.
Publishing Extension
Point
Identifies the extension to be used for an RDU publishing plug-in.This is
useful when you need to publish RDU data to another database.
Extension Point Jar File Specifies the sequence in which the classes are searched in the Jar files that
Search Order
are listed in the preceding four fields.
Allow Unknown CPE
Check this option if you wish to enable devices, that need to be provisioned
but are not yet added to the RDU.
Submit
Reset
Activates or implements the changes you have made.
Returns all settings to their previous settings.
Note
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-10
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Configuring Defaults
System Defaults
Figure 17-4 System Defaults Page
Table 17-5
Configure System Defaults Page
Field or Button
Description
Default Device Type for
Device Detection
Identifies the default device type for a device not previously registered in
the RDU. The options include:
•
•
CWMP
None
If the device detection extension is unable to identify the device type, the
“default type” (CWMP or None) specifies the device type. If you set the
Default Device Type as None, the device record is not added to the RDU.
Unregistered devices can request the RDU for configurations only if you
have enabled the service cwmp num allow-unknown-cpe option from
the DPE command line interface. Otherwise, a request from an unknown
device is not forwarded to the RDU.
Maximum Troubleshooting Identifies the maximum number of devices that you can troubleshoot at
Device Count any one time. The default number is 100.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-11
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Configuring Defaults
Table 17-5
Configure System Defaults Page (continued)
Field or Button
Description
Device History
Identifies if logging device record and device configurations is enabled
or disabled.
Immediate Operation
History
Identifies if logging of history of device operation initiated from the API
using immediate mode is enabled or disabled.
On-Connect Operation
History
Identifies if logging of history of device operation initiated from the API
using on-connect mode is enabled or disabled.
Instruction Generation
History
Identifies if logging the history of device instruction generation is
enabled or disabled.
Maximum History Entries Defines the maximum number of entries of device history that will be
Per Device
stored for each device. The default number of entries is 40.
Performance Statistics
Collection
Determines if statistics collection is enabled. See Monitoring
Performance Statistics, page 11-14, on performance statistics.
Abbreviated ParamList
Enable this if you want to abbreviate the parameter names available in the
configuration template. If enabled, parameter names are replaced with a
dot (.).
Submit
Reset
Activates or implements the changes you have made.
Returns all settings to their previous settings.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-12
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Configuring Defaults
TACACS+ Defaults
When you click the TACACS+ Defaults link, the TACACS+ Defaults page appears.
Figure 17-5 TACACS+ Defaults Page
Table 17-6
Configure TACACS+ Defaults Page
Field or Button
Description
TACACS+ Authentication
Allows you to enable or disable TACACS+
Authentication. TACACS+ Authentication is
disabled by default.
TACACS+ Client Read/Write timeout
Specifies the duration that the TACACS+ client
waits for a TACACS+ server to reply to
TACACS+ protocol requests.
The range is from 1 to 300 seconds. The default is
5 seconds and applies to all TACACS+ servers
TACACS+ Client Maximum retries
Specifies the number of times the TACACS+
client attempts a valid TACACS+ protocol
exchange with a TACACS+ server if it fails to
respond to the initial request.
The range is from 0 to 10. The default is 1 and
applies to all TACACS+ server defined
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-13
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Configuring Defaults
Table 17-6
Configure TACACS+ Defaults Page (continued)
Field or Button
Description
TACACS Server 1
Specifies the IP address or the hostname of the
TACACS+ server that has the highest priority and
serves as the first choice for the TACACS+
clients.
When TACACS+ authentication is enabled, the
client attempts user login authentication to each
server sequentially in the list until a successful
authentication exchange is achieved, or the list is
exhausted.
If the list is exhausted, the client automatically
falls back to the local authentication mode.
TACACS Server 1 Secret Key
TACACS Server 2
Specifies the secret key used for encryption
between the RDU and the TACACS+ server 1.
The secret key is stored in the RDU database.
Specifies the IP address or the hostname of the
TACACS+ server that is queried by the TACACS+
client when the TACACS+ server 1 is
unreachable.
TACACS Server 2 Secret Key
TACACS Server 3
Specifies the secret key used for encryption
between the RDU and the TACACS+ server 2.
Specifies the IP address or the hostname of the
TACACS+ server that is queried by the TACACS+
client when the TACACS+ server 1 and
TACACS+ server 2 are unreachable.
TACACS Server 3 Secret Key
TACACS Server 4
Specifies the secret key used for encryption
between the RDU and the TACACS+ server 3.
Specifies the IP address or the hostname of the
TACACS+ server that is queried by the TACACS+
client when the TACACS+ server 1, TACACS+
server 2 and TACACS+ server 3 are unreachable.
TACACS Server 4 Secret Key
TACACS Server 5
Specifies the secret key used for encryption
between the RDU and the TACACS+ server 4.
Specifies the IP address or the hostname of the
TACACS+ server that is queried by the TACACS+
client when the TACACS+ server 1, TACACS+
server 2, TACACS+ server 3 and TACACS+
server 4 are unreachable.
TACACS Server 5 Secret Key
Specifies the secret key used for encryption
between the RDU and the TACACS+ server 5.
Submit
Reset
Activates or implements the changes you have
made.
Returns all settings to their previous settings.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-14
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Managing Files
If you remove one TACACS+ server and replace it with another server, the newly added server will have
the same priority as the removed server.
To change the order of the TACACS+ servers in the priority list, remove all server addresses and re-enter
them in the desired order.
Managing Files
By using the Cisco BAC administrator user interface, you can manage the template files and the
parameter dictionaries for dynamic generation for CWMP files, or software images for devices (see
•
•
•
Configuration Template—These are XML files that contain CWMP configuration policy, including
parameter value settings, Notification attributes and Access Control attributes. See Authoring
Configuration Templates, page 5-14, for additional information.
Firmware File—These are images of device firmware, which can be downloaded to devices to
upgrade their functionality. Cisco BAC treats this file type like any other binary file. See Firmware
Management, page 6-1, for additional information.
Firmware Rules Template—These are XML files written according to a published schema
document. Each firmware rules template contains one or more rules that trigger firmware updates
•
•
JAR File—This file type is used to load Cisco BAC extensions.
Parameter Dictionary—These are XML files that list valid objects and parameters used by Cisco
BAC to configure a device. The dictionaries validate the objects and parameters used in the
information.
•
•
•
Parameter List—These XML files list a predefined set of parameters from the device that are
retrieved every time the device contacts Cisco BAC.
DPE Extension Script—These script files are main extension scripts having the main provisioning
Helper Script—These script files are utilities which can be used by multiple main extension scripts.
The helper scripts are called from both the main extension scripts and other helper scripts.
Note
Figure 17-6 is displayed after clicking the Search button on the Manage Files page.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-15
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Managing Files
Figure 17-6
Manage Files Page
Table 17-7
Manage Files Page
Description
Field or Button
File Type
File Type
Identifies the file type.
File Name
Identifies the file name. This value can be a complete file name or can
contain a wildcard character at the start of the string to match all files with
a given suffix.
Page Size
Identifies the length of page to be displayed.
Search
Initiates the search for files with a name that matches the selected File Type
and File Name search parameters.
Add
Adds a new file.
Delete
Files
Removes any selected files from the database.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-16
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Managing Files
Table 17-7
Manage Files Page (continued)
Field or Button
File Type
Description
Files list
Displays a list of files that match the search criteria.
Note
The check boxes immediately to the left of any selected item in this
list must be checked before it can be deleted.
View
Displays the details of the selected file.
File Type
Identifies the type of file; for example, Configuration Template, Firmware
Rules Template, Parameter List.
Export
Exports any selected file to the client’s computer.
Adding Files
To add an existing file to the RDU database:
Step 1
Step 2
Choose Configuration on the Primary Navigation bar.
Choose Files on the Secondary Navigation bar.
The View Files page appears.
Step 3
Step 4
Click Add.
Choose the File Type.
Note
For Firmware file type, two additional fields are provided: Firmware Version and Description,
both of which are purely informational. You can enter any string in these fields.
Step 5
Browse for the Source File Name.
By default, file sizes up to 20 MB are supported.
Enter the File Name.
Step 6
Step 7
Click Submit.
The View Files page appears to indicate that the file has been added.
Cisco BAC now extends the http file service so that it can read the firmware file from the DPE file system
or DPE cache
When the firmware image size is very large (say 100 MB), adding the file through RDU may not be
efficient. These files can be manually transferred to all the DPEs using tools such as scp, ftp and later
when device requests for these files, they can be transferred to the device from the DPE.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-17
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Managing Files
Viewing Files
To view the contents of a file:
Step 1
Step 2
Choose Configuration on the Primary Navigation bar.
Choose Files on the Secondary Navigation bar.
The View Files page appears.
Step 3
Step 4
Search for the required file by using File Type.
Click the View Details icon ( ) corresponding to the File Type you had specified for a search.
The View File page appears.
Replacing Files
To replace an existing file:
Step 1
Step 2
Step 3
Choose Configuration on the Primary Navigation bar.
Choose Files on the Secondary Navigation bar.
Select the link that corresponds to the file you want to replace from the search output list.
The Replace File page appears. Note that the selected filename already appears on this page.
Browse for the source file to be used as a replacement for the displayed filename.
Click Submit.
Step 4
Step 5
If you are updating a configuration or firmware template which is associated with a Class of Service,
after submitting the replacement file, a confirmation page appears to indicate that Cisco BAC will
regenerate instructions for the affected devices.
The Instruction Generation Service automatically regenerates instructions for all devices associated with
this template using the Class of Service association and sends new instructions to the appropriate DPEs.
Step 6
Click OK
The View Files page appears.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-18
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Managing Files
Exporting Files
You can copy files to your local hard drive by using the export function.
Note
The procedure described below assumes that you are using Internet Explorer. This procedure is different
if you are using Netscape Navigator.
To export a file:
Step 1
Step 2
Step 3
Step 4
Choose Configuration on the Primary Navigation bar.
Choose Files from the Secondary Navigation bar.
Identify the file that you want to export.
To export
•
•
Binary files, click the Export icon ( ) and you are prompted to either open the file or save it.
XML files, such as templates, clicking the Export icon displays the file content. Therefore, you
must right-click the Export icon and select Save Target As.
Step 5
Return to the Cisco BAC administrator user interface.
Deleting Files
Complete this procedure to delete an existing file:
Step 1
Step 2
Step 3
Step 4
Choose Configuration on the Primary Navigation bar.
Choose Files on the Secondary Navigation bar.
In the Files area, enter the filename of the file that you want to modify.
Click Search.
The appropriate file appears in the Files list.
Choose the appropriate file or files.
Step 5
Step 6
Click Delete.
Caution
Note
Deleting a template file that is not directly linked to a Class of Service, but is referenced by another
template file that is linked to a Class of Service, causes the instruction regeneration service to fail.
You cannot delete a file associated with a Class of Service. You must remove the Class of Service
information.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-19
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Managing License Keys
Managing License Keys
Software licenses are used to activate specific features or to increase the functionality of your
installation. Each license is available as either a permanent license or an evaluation license.
•
•
Permanent—A permanent license is purchased for use in your network environment and activates
the specific features for which it is intended.
Evaluation—An evaluation license enables functionality for a specific amount of time after
installation. You can upgrade an evaluation license to a permanent license by entering a new
permanent license number.
Caution
Do not attempt to deploy into a fully operational network with an evaluation license key installed. Any
provisioning done by using an evaluation license is disabled when that evaluation license expires.
When you upgrade from an evaluation license to a permanent license, you do not have to re-install the
software or reconfigure Cisco BAC. You simply have to provide the permanent license using the Cisco
BAC administrator user interface.
The Manage License Keys page (Figure 17-7) displays a list of licenses that have been entered for your
implementation. This Cisco BAC release supports both evaluation and permanent licenses for the
CWMP-compliant devices, and DPEs. The status of each available license appears as active, expired, or
identifies the expiration date.
Note
You can upgrade a permanent license to increase the number of authorized devices by adding an
additional license. When you reach the limit of your number of licensed devices you cannot provision
new devices, but existing devices that are already provisioned continue to receive service.
Figure 17-7
Manage License Keys Page
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-20
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Managing DPE Feature Pack Extensions
Adding and Modifying a License
To add, modify, or upgrade a license:
Step 1
Step 2
Step 3
Choose Configuration on the Primary Navigation bar.
Choose License Keys on the Secondary Navigation bar.
Obtain your new license key from either your Cisco Systems representative or the Cisco Technical
Step 4
Step 5
Enter the new license key in the License Key field.
Click Add/Upgrade to install the new license key.
•
If you enter a permanent license key, it overwrites the corresponding evaluation key (if that key was
installed).
•
If you enter a license key (permanent or evaluation) for a new technology, it will appear in the
technology list.
.
Managing DPE Feature Pack Extensions
Cisco BAC provides a mechanism to license DPE feature packs extension. The feature pack licenses
indicate the count of the devices that can be processed by the feature pack extension. The feature pack
licenses can be added to the RDU through BAC admin UI (Configuration -> License Key) or API
independently with or without CWMP or DPE licenses.
You must buy enough CWMP licenses to cover the number of devices that would use the feature pack
extensions. For instance, if you buy a Femto feature pack license for X number of devices and DLC
feature pack license for Y number of devices, then you must buy CWMP License for at least X+Y
number of devices.
The feature pack licensing leverages BAC's existing licensing mechanism. Adding feature pack licenses
to the RDU is similar to adding other licenses such as DPE and CWMP.
The DPE feature pack license is similar to RDU, DPE and CWMP license. However, in the case of DPE
feature pack license, the MANIFEST of the DPE feature pack extension JAR should have the attribute
Extension-Name defined and its value should be in the format FP- Technology Name - versionnumber.
Where:
FP—Denotes it is a feature pack license.
ExtensionName— DPE extension technology name. For example, Femto, DLC, CPEaaS.
VersionNumber— DPE extension technology version. This version number must be the same or lower
than the version of the feature pack license added in DPE. If not, the DPE registration fails.
A few examples for FP- Technology Name - versionnumber would be FP-CPEaas-1.0, FP-CPEaas2.0,
FP-Femto-10, FP-DLC-1.0 and so on.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-21
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Managing DPE Feature Pack Extensions
Writing a New Class for DPE Feature Pack Extensions
This procedure illustrates how to write a new class for DPE feature pack extension. This section also
provides details about how to add a new class and integrate it with the DPE.
To write the new class:
Step 1
Step 2
Create a Java source file for the custom publishing extension, and compile it.
Create a manifest file for the JAR file that will contain the extension class.
For detailed information on creating a manifest file and using the command-line JAR tool, see Java
documentation.
For example:
Manifest-Version: 1.0
Ant-Version: Apache Ant 1.6.2
Created-By: 17.0-b16 (Sun Microsystems Inc.)
Implementation-Title: Cisco Broadband Access Center Femtocell Extension
Implementation-Version: FEMTOEXT 3.7 (test-build)
Implementation-Vendor: Cisco Systems, Inc.
Extension-Name: FP-femtoext-3.7
Java JAR file manifests contain attributes that are formatted as name-value pairs and support a group of
attributes that provide package versioning information.
Note
Cisco BAC accepts only those extension JAR files that include a manifest with the Extension-Name
attribute in the files.
Step 3
For each new class being subclassed, create a mapping file in the directory META-INF/services.
The name of the mapping file is the same as the new class being subclassed. This mapping file contains
the names of the new subclasses of that class.
For example create the mapping file:
META-INF/services/com.cisco.provisioning.cpe.extensions.dpe.spi.cwmp.SoapRequestSenderServ
ice
This file consists of the following:
# This example configures the class SoapRequestSenderProvider as a DPE service
# provider extension class attached to the DPE service SoapRequestSenderService.
# Service providers for:
# com.cisco.provisioning.cpe.extensions.dpe.spi.cwmp.SoapRequestSenderService
com.cisco.bac.femto.dpe.extensions.FemtoServiceEnablementExtension
Step 4
Create the JAR file for the custom extension point in the directory <BAC_HOME>/dpe/conf/.
For example:
C:\>jar cm0vf manifest.txt femto.jar com
added manifest
adding: com/(in = 0) (out= 0)(stored 0%)
adding: com/cisco/(in = 0) (out= 0)(stored 0%)
adding: com/cisco/bac/(in = 0) (out= 0)(stored 0%)
adding: com/cisco/bac/femto/(in = 0) (out= 0)(stored 0%)
adding: com/cisco/bac/femto/dpe/(in = 0) (out= 0)(stored 0%)
adding: com/cisco/bac/femto/dpe/extensions/(in = 0) (out= 0)(stored 0%)
adding: com/cisco/bac/femto/dpe/extensions/
FemtoServiceEnablementExtension.class(in = 4038) (out= 4038)(stored 0%)
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-22
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Managing DPE Feature Pack Extensions
C:\>
Note
You can give the JAR file any name. The name can be descriptive, but do not duplicate another
existing JAR filename.
Managing RDU Extensions
Creating a custom extension point is a programming activity that can, when used with the Cisco BAC
administrator user interface, allow you to augment Cisco BAC behavior or add support for new device
technologies.
Before familiarizing yourself with managing extensions, you should know the RDU extension points that
Cisco BAC requires. At least one disruption extension must be attached to the associated technology’s
disruption extension point when disrupting devices on behalf of a batch.
Table 17-8 lists the RDU extension points that Cisco BAC requires to execute extensions.
Table 17-8
Required RDU Extension Points
Specific to
Technology?
Extension Point
Description
Use
Common Configuration
Generation
Executed to generate a configuration for a
device.
Optional
No
Extensions attached to this extension point
are executed after the technology-specific
service-level selection extension and before
the technology-specific configuration
generation extensions.
The default extensions built into this release
do not use this extension point.
Configuration Generation
Device Detection
Executed to generate a configuration for a
device.
Required Yes
Executed to determine a device technology Required No
based on information in the DHCP Discover
request packet of the device.
Disruption
Publishing
Executed to disrupt a device.
Optional
Yes
No
Executed to publish provisioning data to an Optional
external datastore. The default extensions
built into Cisco BAC, do not include any
publishing plug-ins.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-23
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Managing DPE Feature Pack Extensions
Table 17-8
Required RDU Extension Points (continued)
Specific to
Technology?
Extension Point
Description
Use
Service-Level Selection
Executed to select the service level to grant to Optional
a device.
Yes
Extensions attached to this extension point
are executed before any common
configuration generation extensions and the
technology-specific configuration generation
extensions.
Authentication
Executed to authenticate the user through
remote authentication servers. Extensions
will be attached to the extension points based
on the authentication mode listed in RDU
Defaults Page.
Required Yes
RADIUS extensions are default built in
authentication extensions in BAC.
Managing extensions includes:
•
•
•
Note
You can specify multiple extension points by making them run one after another. You do this by
specifying the extensions points in a comma-separated list.
Writing a New Class for RDU
This procedure illustrates the entire custom extension creation process. You can create many different
types of extensions; for the purposes of this procedure, a new Publishing Extension Point is used.
To write the new class:
Step 1
Step 2
Create a Java source file for the custom publishing extension, and compile it.
Create a manifest file for the JAR file that will contain the extension class.
For detailed information on creating a manifest file and using the command-line JAR tool, see Java
documentation.
For example:
Name: com/cisco/support/extensions/configgeneration
Specification-Title: "TOD synchronization"
Specification-Version: "1.0"
Specification-Vendor: "General TW, Inc."
Implementation-Title: "Remove the time-servers DHCP option"
Implementation-Version: "1.0"
Implementation-Vendor: "Cisco Systems, Inc."
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-24
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Managing DPE Feature Pack Extensions
Java JAR file manifests contain attributes that are formatted as name-value pairs and support a group of
attributes that provide package versioning information.
While Cisco BAC accepts extension JAR files that do not contain this information, we recommend that
you include a manifest with versioning information in the files to track custom RDU extensions.
You can view manifest information from the administrator user interface using the Servers > RDU >
View Regional Distribution Unit Details page.
Detailed information on the installed extension JAR files and the loaded extension class files appears
after the Device Statistics section. You can view manifest information from the RDU logs also.
Step 3
Create the JAR file for the custom extension point.
For example:
C:\>jar cm0vf manifest.txt removetimeservers.jar com
added manifest
adding: com/(in = 0) (out= 0)(stored 0%)
adding: com/cisco/(in = 0) (out= 0)(stored 0%)
adding: com/cisco/support/(in = 0) (out= 0)(stored 0%)
adding: com/cisco/support/extensions/(in = 0) (out= 0)(stored 0%)
adding: com/cisco/support/extensions/configgeneration/(in = 0) (out= 0)(stored 0%)
adding: com/cisco/support/extensions/configgeneration/
RemoveTimeServersExtension.class(in = 4038) (out= 4038)(stored 0%)
C:\>
Note
You can give the JAR file any name. The name can be descriptive, but do not duplicate another
existing JAR filename.
Installing RDU Custom Extensions
After a Jar file is created, use the administrator user interface to install it:
Step 1
Use the Browse function to locate the Jar file created in the procedure, Writing a New Class for RDU,
page 17-24, and select this file as the Source File; leaving the File Name blank assigns the same filename
for both source and external. The filename is what you will see through the administrator user interface.
Step 2
Step 3
Click Submit.
Return to the RDU Defaults page and note that the newly added Jar file appears in the Extension Point
Jar File Search Order field.
Step 4
Enter the extension class name in the Publishing Extension Point field.
The RDU returns an error if the class name does not exist within the jar file or if Cisco BAC detects any
other errors. This error occurs mostly when replacing a Jar file, if, for example, the class you set up is
not found in the replacement Jar file.
Step 5
Step 6
Click Submit to commit the changes to the RDU database.
View the RDU extensions to ensure that the correct extensions are loaded.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-25
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Publishing Provisioning Data
Viewing RDU Extensions
You can view the attributes of all RDU extensions directly from the View Regional Distribution Unit
Details page. This page displays details on the installed extension Jar files and the loaded extension class
files.
Publishing Provisioning Data
Cisco BAC has the capability to publish the provisioning data it tracks to an external datastore in real
time. To do this, a publishing plug-in must be developed to write the data to the desired datastore. The
Manage Publishing page identifies information such as the plug-in name, its current status (whether it is
enabled or disabled), and switch to enable or disable it.
You can enable as many plug-ins as required by your implementation but care must be exercised because
the use of publishing plug-ins can decrease system performance.
Note
Cisco BAC does not ship with any publishing plug-ins. You must create your own plug-ins and load them
plug-ins from the Manage Publishing page.
Publishing Datastore Changes
To enable or disable a publishing plug-in:
Step 1
Step 2
Choose Configuration on the Primary Navigation bar.
Choose Publishing on the Secondary Navigation bar.
The Manage Publishing page appears. This page displays a list of all available database plug-ins and
identifies the current status of each. C
Step 3
Click on the appropriate status indicator to enable or disable the required plug-in. Note that as you click
the status, it toggles from enabled to disabled.
Modifying Publishing Plug-In Settings
These settings are a convenient way for plug-in writers to store plug-in settings in the RDU for their
respective datastore. To modify the publishing plug-in settings:
Step 1
Step 2
Choose Configuration on the Primary Navigation bar.
Choose Publishing on the Secondary Navigation bar,
The Manage Publishing page appears.
Step 3
Click the link corresponding to the plug-in you want to modify.
The Modify Publishing Plug-Ins page appears.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-26
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Configuring Lease Query
Table 17-9 identifies the fields shown in the Modify Publishing Plug-Ins page.
Table 17-9
Modify Publishing Plug-ins Page
Field or Button
Plug-In
Description
Identifies publishing plug-in name.
Server
Identifies the server name on which the data store resides.
Identifies the port number on which the data store resides.
Port
IP Address
Identifies the IP address of the server on which the data store resides. This
is usually specified when the server name is not used.
User
Identifies the user to allow access to the data stored.
Password
Identifies the user’s password which allows access to the data stored.
This is used to confirm the password entered above.
Confirm Password
Step 4
Enter the required values in the Server, Port, IP Address, User, Password, and Confirm Password fields.
These are all required fields and you must supply this information before proceeding.
Click Submit to make the changes to the selected plug-in, or click Reset to clear all fields on this page.
Configuring Lease Query
Cisco BAC, by default, binds to the IP addresses and ports that are described in the below table.
Table 17-10
Modify Publishing Plug-ins Page
Protocol
IP Address
Port
IPv4
WildCard
Any available port
The wildcard is a special local IP address. It usually means "any" and can only be used for bind
operations.
You can also configure the IP address and port of your choice for lease query communication using the
same properties. For example:
/cnrQuery/clientSocketAddress=10.1.2.3:166
Using this property, the DPE binds to the IP address and the port that you specify.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-27
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 17 Configuring Broadband Access Center
Configuring Lease Query
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
17-28
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
18
Scripting Framework
This chapter describes the Scripting framework in Cisco BAC that involves configuring java script based
DPE extensions.
This chapter includes the following sections:
•
•
•
•
•
•
•
•
Overview
Scriptable extension service facilitates running the java scripts based DPE extensions. Once the
extension scripts are added in the RDU database, the RDU applies the scripts to the DPE cache. When
the CPE boots and attempts to establish connection with the DPE, the extension scripts are executed
based on the extensions configured in the device property hierarchy.
Script’s Shared Scope
Script’s Shared Scope is a shared repository for extension scripts. Cisco BAC APIs like get properties
from PG, fire extension specific events, debugging, logging, and so on, are put into the Script’s Shared
Scope so that the extension scripts can call them whenever required.
The following objects are added in the Script’s Shared Scope for extension scripts:
Table 18-1
Java Objects
Object Name
request
API
CwmpHttpRequest
CwmpHttpResponse
response
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
18-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 18 Scripting Framework
Extension Script
Table 18-1
Java Objects
Object Name
session
API
CwmpHttpSession
ScriptSupport
CwmpHttpService
DefaultLogStream
scriptSupport
service
log
By default the following frequently used Java packages are imported into the Script's Shared Scope:
java.lang.*;
java.util.*;
com.cisco.provisioning.cpe.cwmp.main.*;
com.cisco.provisioning.cpe.cwmp.soap.messages.*;
com.cisco.provisioning.cpe.cwmp.soap.types.*;
com.cisco.provisioning.cpe.extensions.dpe.api.events.*;
com.cisco.provisioning.cpe.extensions.dpe.faults.*;
com.cisco.csrc.dpe.extensions.script.*;
You can also add any third-party libraries into the Script's Scope by adding the jar files into /dpe/lib
folder. During DPE start-up, the class loader will load all the jars available in /dpe/lib folder. You can
import the Java packages in the extension scripts to make use of the Java classes available in the libraries
loaded.
For example, you can import the java packages using the following command:
importPackage (Packages.com.mylib.test);
Note
Restart the DPE after adding the jar files.
Extension Script
Extension scripts are classified into two categories:
•
DPE Extension Script—These script files are main extension scripts having the main provisioning
logic.
The following script is a sample DPE extension script:
log.debug(" Executing sample extension...");
var params = ["Device.DeviceInfo.SoftwareVersion"];
log.debug(" Getting SoftwareVersion info...");
var result = getParamValues(scriptSupport, response, params);
log.debug(" Got response from the device ==> ");
log.debug(result.toString());
•
Helper Script—These script files are utilities which can be used by multiple main extension scripts.
The helper scripts are called from both main extension scripts and other helper scripts.
The following script is a sample Helper script:
function getParamValues(scriptSupport, response, params)
{
if (params && params.length > 0)
{
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
18-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 18 Scripting Framework
Integrating Extension Scripts in BAC
// With continuation support, the script gets the
// response the in the same line as if using
// a synchronous interface
// sendAndReceive() sends the give message to the
// device and receives the response message.
return scriptSupport.sendAndReceive(response,
scriptSupport.newGetParameterValuesMessage(params));
}
return null;
}
Integrating Extension Scripts in BAC
The extension scripts are added to RDU database from the admin UI.
To add a new extension script to the Cisco BAC RDU:
Step 1
Step 2
Step 3
Choose Configuration on the primary navigation bar.
Choose Files on the secondary navigation bar. The View Files page appears.
Click Add.
The Add Files page appears.
Step 4
Step 5
Step 6
Step 7
Choose DPE Extension Script / Helper Script from the File Type drop-down list.
Browse for the Source File Name.
Add the .js file in the File Name field.
Click Submit.
The View Files page appears with the new file.
The extension scripts can be viewed only after exporting the .js script file from the admin UI to your
local machine. For more information on exporting extension scripts, see Exporting Files, page 17-19.
Adding Extension Points to the Device Property
Extensions can be configured in the device property hierarchy at Class of Service (CoS), Device, Group,
Provisioning group and CWMP defaults.
The following extension points can be configured in the device:
•
•
•
•
/IPDevice/extensions/soapRequestSender - The extension scripts configured are executed, when a
request is received from the CPE.
/IPDevice/extensions/soapResponseSender - The extension scripts configured are executed, when a
response is sent to the CPE.
/IPDevice/extensions/incomingEventViewer - The extension scripts configured are executed, when
the event (existing configuration) is received from the CPE.
/IPDevice/extensions/outgoingEventViewer - The extension scripts configured are executed, when
the event (required configuration) is sent to the CPE.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
18-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 18 Scripting Framework
Configuring Extensions for Unknown Devices
To add scriptable extensions at CWMP Defaults level:
Choose Configuration on either the primary navigation bar or main menu page.
Step 1
Step 2
Choose Defaults from the secondary navigation bar.
Configure the extension scripts for the required extensions.
Step 3
For example, specify sampleExtension.js in the SOAP Request Sender Extension field. Similarly,
specify the required extension scripts in the SOAP Response Sender Extension, Incoming Event
Viewer Extension, and Outgoing Event Viewer Extension fields.
For information on adding extension scripts to the RDU database, see Integrating Extension Scripts in
Step 4
Note
Click Submit.
The scriptable extensions are added in the DPE.
If the extensions are not configured at Class of Service (CoS), Device, Group, or Provisioning group
level in the device property hierarchy, by default, extensions configured under CWMP defaults are
executed.
Configuring Extensions for Unknown Devices
You can configure the extension list for unknown devices from the admin UI from the CWMP Defaults
page. This enables the DPE to retrieve the list of default extensions and execute the extension scripts,
when the unknown device establishes connection with the DPE.
To configure extensions for unknown devices:
Step 1
Step 2
Add the extension script to the RDU database using DPE Extension Script file.
For more details on how to add an extension script in BAC, see Integrating Extension Scripts in BAC,
Configure the extension in the CWMP Defaults page.
Boot an unknown device.
Step 3
Step 4
Verify that the extension script is executed in DPE.
For more details on verifying the status of the extensions loaded in DPE, see Verifying Status of the
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
18-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 18 Scripting Framework
Verifying Extension Scripts Availability in DPE Cache
Verifying Extension Scripts Availability in DPE Cache
When the device boots, it contacts DPE and invokes the extension scripts available in DPE cache based
on the extensions configured for the device.
To verify whether the extensions scripts are pushed to DPE cache from RDU:
Step 1
Step 2
Log into DPE CLI.
Verify that the extension scripts are available in the DPE cache, using the following command:
dpe# show files
The following is a sample output:
The list of files currently in DPE cache
filename
size
2161
main.js
passthroughtest.js
sample-firmware-image.bin
sampleextension.js
samplehelper.js
4106
4239368
3319
2645
DPE caching 5 external files.
Listing the first 5 files, 0 files omitted
Verifying Status of the Extensions in DPE
The extensions scripts are executed in DPE, based on the extension points configured in device property
hierarchy.
To verify if the extensions are executed in the DPE after booting the device:
Step 1
Step 2
Log into DPE CLI.
Enable debug for DPE extensions using the command:
debug dpe dpe-ext
Step 3
Step 4
Boot the device.
Observe the dpe.log file to verify if the scripts are executed in DPE. To view DPE logs see Viewing the
The following is a sample output:
[Device [00000C-1234567890] Session [149eb9f53A137fed6a9c353A80000023]. Extension
[sampleextension.js].]: [Executing script [sampleextension.js] for the firs
t time]
Note
The result is displayed in the dpe.log file.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
18-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 18 Scripting Framework
Verifying Status of the Extensions in DPE
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
18-6
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
19
RDU and DPE Connection Management
This chapter deals with RDU TCP Connection Management, RDU Batch Concurrency and RDU DPE
synchronization.
This chapter includes the following sections:
•
•
•
TCP Connection Management
Communication between the RDU and its clients, such as DPEs, API, occurs over TCP. Each client
creates a connection to the RDU that is maintained as long as the client desires.
Over this connection, clients submit batches to the RDU while the RDU replies with the batch results
and additionally sends events. In order to maintain the connection, a heart beat is used when no other
traffic is available. Timeouts are used to prevent the RDU and the clients from creating unwanted traffic.
Heart Beat
Heart beat messages are initiated by the clients. The client sends a heart beat when a read timeout has
occurred and it is in the process of receiving a message. On receiving this heart beat, the RDU echoes it.
The client receives this echo and recognizes that the connection is alive. This cycle repeats itself until
the connection is lost.
If the client fails to receive a reply after sending the heart beat (echo message), it closes its connection
and attempts to open a new one.
The RDU will close the connection if no traffic is sent or received for two consecutive read timeouts. To
change the number of read timeouts before closing the connection, you must set the following property
in the RDU property file and restart the application. You can configure this property in the
BPR_HOME/rdu/rdu.properties file.
/messaging/connection/numReadTimeouts=value
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
19-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 19 RDU and DPE Connection Management
RDU Batch Concurrency
RDU Batch Concurrency
In the Cisco BAC system, a provisioning client submits API requests to the RDU in the form of batches
containing single or multiple commands. A command represents an operation that can be performed on
an object in the RDU's database, for example, changing a device's Class of Service. Depending on the
commands contained in the batch, the RDU runs the batch in one of two modes: concurrent or
non-concurrent.
The commands contained within a batch determine the mode it is to be run with. When a batch is
received at the RDU, its commands are checked and the batch is marked with the mode with which it
must be run with. During the execution of a concurrent-mode batch, other concurrent-mode batches are
allowed to be run, in parallel. The majority of batches executed are run in the concurrent mode.
If the batch is marked as non-concurrent, it is executed only when all the currently executing batches are
completed in the RDU. The non-concurrent batch is run alone. After the batch completes running, the
RDU processes the queued batches in the mode that they have been marked.
The reason concurrent and non-concurrent modes exist is to provide higher throughput at the RDU
without losing data integrity. There are only a few commands that cause a batch to run in non-concurrent
mode. They are mainly concerned with system configuration operations that are not called very often.
Non-concurrent Commands
Along with Server Registration, if any of the following commands are present in a batch, it is run in
non-concurrent mode.
Configuration Interface
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
addLicenseKey
addUser
addCustomPropertyDefinition
addClassOfService
addFile
changeClassOfServiceProperties
changeDPEDefaults
changeExtensionPointSettings
changeRDUDefaults
changeSystemDefaults
changeFileProperties
changeProvGroupProperties
changeUser
deleteClassOfService
deleteFile
deleteLicenseKey
removeCustomPropertyDefinition
replaceFile
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
19-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 19 RDU and DPE Connection Management
DPE-RDU Synchronization
IPDevice Interface
•
•
•
•
•
•
•
•
•
•
•
addDeviceType
changeDefaults
deleteDeviceType
regenConfigs
IPDevice.addNode
IPDevice.changeNodeProperties
IPDevice.deleteNode
IPDevice.addNodeType
IPDevice.changeNodeTypePriority
IPDevice.changeNodeTypeProperties
IPDevice.deleteNodeType
Long-Running Batch
A long-running batch is one that requires more than two seconds to run. The only batch that fits into this
category is the synchronization batch submitted by the DPEs. Additional batches can become long
running batches if custom extension points are used to interface with external systems (e.g. publishing
to an external database).
Long-running batches, interleaved with non-concurrent batches, can create an impression that the RDU
is not responding or is frozen. If a long-running batch is in progress and the next batch in the queue is a
non-concurrent batch, the RDU waits for all current batches to finish before it starts to run the
non-concurrent batch. It also will not start any other batches.
At those times, the RDU will seem to not respond. However, as soon as the long-running batch is
completed, the RDU resumes running the queued batches. At this point, the RDU will respond again.
DPE-RDU Synchronization
Cisco BAC supports multiple DPEs. The DPEs communicate with devices and the RDU. During
installation, you must configure the following for each DPE:
•
Name of the provisioning group to which this DPE belongs; this name determines the logical group
of devices serviced by this DPE.
•
The IP address and port number of the RDU.
The RDU generates the instructions for the device and sends the new instructions to all DPEs that service
the provisioning group of the given device. The RDU will regenerate the instructions for a device when
certain provisioning API calls are made at the RDU (such as changing the Class of Service of the device).
The DPE stores the instructions and uses it to service subsequent requests.
The DPE persists all device instructions that it receives from the RDU to disk. Each instruction includes
an identifier (device identifier or file name) and a revision number which is incremented every time the
instruction is regenerated. In addition to events (dynamic notifications) fired by the RDU to all DPEs
when a given configuration changes, there is also an automatic synchronization process which is used to
bring DPE up-to-date with the RDU.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
19-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 19 RDU and DPE Connection Management
DPE-RDU Synchronization
The DPE-RDU synchronization is a process of automatically updating the DPE cache to be consistent
with the RDU. The DPE cache comprises the instruction cache, with instructions for devices, and the
file cache, with files required for devices.
Under normal conditions, the RDU generates the events with instruction updates and sends them to all
relevant DPEs to keep them up to date. Synchronization is needed if the DPE is missing some events
because of connection loss. Such loss could be because of a network issue, the DPE server going down
for administrative purposes, or a failure.
Synchronization also covers the special case when the RDU database is restored from backup. In this
case, the DPE cache database must be returned to an older state to be consistent with the RDU.
Note
The RDU and DPE synchronization process is automatic and requires no administrative intervention.
Throughout the synchronization process, the DPE is still fully capable of performing provisioning and
management operations on the CPE.
The DPE triggers the synchronization process every time it establishes a connection with the RDU.
When the DPE first starts up, it establishes the connection to the RDU and registers with the RDU to
receive updates of instruction changes. The DPE and RDU then monitor the connection by using
heartbeat message exchanges.
When the DPE determines that it had lost its connection to the RDU, it automatically attempts to
re-establish it. It continues attempting to do this with a backoff-retry interval until it is successful. The
RDU also detects the lost connection and stops sending events to this DPE. Since the DPE may miss the
update events from the RDU when the connection is down, the DPE performs synchronization every time
it establishes a connection with the RDU.
During the process of connection establishment and registration with the RDU, the DPE is in the
Registering state.
Note
To manually trigger the synchronization process for testing purpose, you can use the DPE CLI command
dpe reload or break the connection by disconnecting and reconnecting the Ethernet cable.
The DPE requests a list of all the instructions it should have from the RDU. This list contains the
identifiers for instructions and revision numbers, but not the actual instruction content. By using this list,
the DPE determines which instructions in its store are inconsistent (wrong revision number), which ones
are missing, and which ones to delete. Throughout the process of obtaining the synchronization list and
comparing it with its store, the DPE is in the Synchronizing state.
As soon as the DPE finishes determining what to obtain from the RDU, it starts obtaining the instructions
from the RDU. The DPE only obtains missing or out-of-date instructions. During this process, the DPE
is in the Populating state.
The DPE populates at a fixed rate to ensure that the RDU is not overloaded with its requests. If multiple
DPEs in the provisioning group are populating, the population time may be decreased as the requested
instructions are sent to all DPEs in the provisioning group. After the DPE finishes populating, it is in the
Ready state and fully synchronized with the RDU.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
19-4
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
20
Cisco BAC Support Tools and Advanced
Concepts
This chapter contains information on, and explains the use of, tools that help you maintain Cisco
Broadband Access Center (BAC) as well as speed and improve the installation, deployment, and use of
this product.
This chapter includes the following sections:
•
•
•
•
•
•
Note
This section contains examples of tool use. In many cases, the tool filenames include a path specified as
BPR_HOME. This indicates the default installation directory location.
Using the deviceExport.sh Tool
You can obtain information about devices by using the device export tool, which retrieves device
information from the Cisco BAC system and exports it to a flat file. This file can, in turn, be used to
import data into an external application.
The deviceExport.sh tool, located at the BPR_HOME/rdu/bin directory, exports device information
from the backup snapshot of the RDU database to a Comma Separated Value (CSV) format file.
Note
You can use the device export tool only on the backup database; the tool does not export device
information from the live RDU database.
You must provide a list of device properties that are to be exported in the control file. The control file is
an XML file which defines the fields required for export. The tool provides an option to generate a
sample control file, which you can edit to configure which properties to export.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
20-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 20 Cisco BAC Support Tools and Advanced Concepts
Using the deviceExport.sh Tool
You can generate the list of properties predefined in Cisco BAC and available for export by running the
The CSV format is used widely to exchange data between applications. Keep the following rules in mind
about a CSV format file:
•
•
•
•
Each device outputs to one line.
Each line terminates with the UNIX format line separator (\n).
Each field is separated by a comma (,).
If a field contains white space, a comma, or a line separator, it is enclosed by double quotes ("). If
a field contains double-quotes, repeat the character twice to escape it; for instance, "file name"
becomes ""file name"".
•
•
•
A boolean field outputs as true or false.
A byte array outputs to a string with UTF-8 encoding.
If a field is a list, it converts into a formatted string with each item separated by comma; for instance,
a node list outputs as "node1, node2, node3".
•
If a field is a map, it is converted into a long string. The key and data is separated by a comma; for
instance, a map output looks like: "(key1, data1)(key2, data2)(key3, data3)".
•
•
•
If the field value is null or does not exist, the output is an empty string followed by a comma.
The first line is the field name separated by a comma.
There is no comma at the end of each record.
Example 20-1 Sample CSV Format
74:7b:7b:f0:e7:80,admin,true,2,"node1,node2,node3","(prop1,value1)(prop2,value2)",,,
Syntax Description
To use the deviceExport.sh command, use this syntax:
# ./deviceExport.sh [–help] [–samplectrl] controlfile backupdir outputdir
• controlfile—Identifies the path to the control file, which defines the fields required for export.
• backupdir—Identifies the path to the directory, which contains backed-up database files that are to
• outputdir—Identifies the target location for the output files. If the directory does not exist, a new
directory is created.
•
•
help—Generates tool usage information.
samplectrl—Generates the sample control file, which contains the supported properties and device
types, in the current directory. The control file is an XML file that contains the supported properties
and device types. You can remove unwanted properties or choose to export only certain types of
Example 20-2 Sample Control File
# ./deviceExport.sh –samplectrl
<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE CONTROLFILE SYSTEM "device-export-control.dtd">
<!--SAMPLE CONTROL FILE-->
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
20-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 20 Cisco BAC Support Tools and Advanced Concepts
Using the deviceExport.sh Tool
<CONTROLFILE>
<!--Start of field list(REQUIRED)
The field list specifies the device properties that will be exported.
All supported standard fields are listed below. Remove unwanted
fields by deleting the line that contains the field name. Customer
defined properties are not listed but can be added to the list.
-->
<FIELDLIST>
<FIELD>GenericObjectKeys.OID_REVISION_NUMBER</FIELD>
<FIELD>DeviceDetailsKeys.DEVICE_TYPE</FIELD>
<FIELD>DeviceDetailsKeys.OWNER_ID</FIELD>
<FIELD>DeviceDetailsKeys.NODE_DETAILS</FIELD>
<FIELD>DeviceDetailsKeys.DEVICE_ID</FIELD>
<FIELD>DeviceDetailsKeys.FQDN</FIELD>
<FIELD>DeviceDetailsKeys.HOST</FIELD>
<FIELD>DeviceDetailsKeys.DOMAIN</FIELD>
<FIELD>DeviceDetailsKeys.IS_IN_REQUIRED_PROV_GROUP</FIELD>
<FIELD>DeviceDetailsKeys.IS_REGISTERED</FIELD>
<FIELD>DeviceDetailsKeys.IS_PROVISIONED</FIELD>
<FIELD>DeviceDetailsKeys.PROV_GROUP</FIELD>
<FIELD>DeviceDetailsKeys.CLASS_OF_SERVICE</FIELD>
<FIELD>DeviceDetailsKeys.CLASS_OF_SERVICE_SELECTED</FIELD>
<FIELD>DeviceDetailsKeys.PROPERTIES</FIELD>
<FIELD>DeviceDetailsKeys.PROPERTIES_DETECTED</FIELD>
<FIELD>DeviceDetailsKeys.PROPERTIES_SELECTED</FIELD>
<FIELD>DeviceDetailsKeys.REASON</FIELD>
<FIELD>DeviceDetailsKeys.EXPLANATION</FIELD>
<FIELD>DeviceDetailsKeys.CONFIGURATION_REVISION</FIELD>
<FIELD>DeviceDetailsKeys.FIRMWARE_CONFIGURATION_REVISION</FIELD>
<FIELD>DeviceDetailsKeys.REPORTED_IP_ADDRESS</FIELD>
<FIELD>DeviceDetailsKeys.SOURCE_IP_ADDRESS</FIELD>
<FIELD>DeviceDetailsKeys.ROUTABLE_IP_ADDRESS</FIELD>
<FIELD>DeviceDetailsKeys.DEVICE_FAULTS</FIELD>
<FIELD>DeviceDetailsKeys.PENDING_ON_CONNECT_OPERATION_IDS</FIELD>
<FIELD>DeviceDetailsKeys.PASSWORD_IS_PROTECTED</FIELD>
<FIELD>IPDeviceKeys.HOME_PROV_GROUP</FIELD>
<FIELD>IPDeviceKeys.CPE_PASSWORD</FIELD>
<FIELD>IPDeviceKeys.CONNECTION_REQUEST_USERNAME</FIELD>
<FIELD>IPDeviceKeys.CONNECTION_REQUEST_PASSWORD</FIELD>
</FIELDLIST>
<!--End of field list-->
</CONTROLFILE>
Note
The DOCTYPE CONTROLFILE SYSTEMreferences a .dtd file, device-export-control.dtd, which is used for
XML validation. The file is installed in the BPR_HOME/rdu/bin directory.
Example 20-3 Exporting Data from Backup Snapshot
This is an example of exporting data from a backup snapshot:
# ./deviceExport.sh control.xml rdu-backup-20061227-145538 /data/rduexport
Starting exporting devices...
Using backup database in /tmp/rdu-backup-20061227-145538
Device export finished in 28m11s.
Note
The exported file is generated in the specified directory; in the above example, in the
/data/rduexport directory. You do not need to specify the full path to the directory.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
20-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 20 Cisco BAC Support Tools and Advanced Concepts
Using the disk_monitor.sh Tool
Following a successful export from the Cisco BAC backup database, the Device Export tool creates a
device file, which contains the list of device records that are successfully exported from the Cisco BAC
backup database. The filename is bac-device-details-yyyyMMdd-HHmmss.csv:
Where yyyyMMdd-HHmmss identifies the time the file was generated.
Using the disk_monitor.sh Tool
Monitoring available disk space is an important system administration task. You can use a number of
custom written scripts or commercially available tools to do so. The disk_monitor.sh tool is a sample
tool to accomplish this.
The disk_monitor.sh tool, located in the BPR_HOME/rdu/sample/tools directory, sets threshold values
for one or more file systems. When these thresholds are surpassed, an alert is generated through the
syslog facility, at 60-second intervals, until additional disk space is available.
Note
Cisco recommends that, at a minimum, you use the disk_monitor.sh script to monitor the BPR_DATA
and BPR_DBLOG directories.
Syntax Description
# ./disk_monitor.sh file system-directory x
•
•
file system-directory—Identifies any directory in a file system to monitor.
x—Identifies the percentage threshold applied to the specified file system.
Example 20-4 Monitoring Disk Space
Assume that you want to be notified when a file system (/var/CSCObac, for example) with database logs
reaches 80% of its capacity. Enter the command:
# ./disk_monitor.sh /var/CSCObac 80&
When the database logs disk space reaches 80% capacity, an alert is sent to the syslog file:
Dec 7 8:16:03 perf-u80-1 BPR: [ID 702911 local6.warning] File system /var/bpr usage is 81%
(threshold is 80%)
Note
Make sure to configure Solaris or Linux to this on start-up, so that it is started after system reboots
automatically.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
20-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 20 Cisco BAC Support Tools and Advanced Concepts
Using the resetAdminPassword.sh Tool
Using the resetAdminPassword.sh Tool
Cisco BAC supports both local authentication and TACACS+ authentication and you can use the
resetAdminPassword.sh tool to reset the password for both local and TACACS+ authentication.
Run the resetAdminPassword.sh tool from the BPR_HOME/rdu/internal/db/bin directory.
When the authentication is local if you use the resetAdminPassword.sh tool, it allows you to login with
the default password changeme. After logging in, it will prompt you to change the password and you
can change the password as you want.
When TACACS+ authentication is enabled, you can use the resetAdminPassword.sh tool to
temporarily reset bacadmin authentication to local RDU. This tool allows you to login once with the
password changeme to the RDU using the local reset admin password. After logging in, it will prompt
you to change the password where you have to use the changeme password again. Then in the TACACS+
Defaults page you can change the password, as you want.
To enable local authentication, you have to manually change the authentication mode setting, after you
login to the RDU. Otherwise, it will automatically fall back to TACACS+ authentication mode from next
login.
To enable local authentication:
Step 1
Step 2
Choose Configuration on either the Primary Navigation bar or Main Menu page.
Choose Defaults from the Secondary Navigation bar.
The Configure Defaults page appears.
Step 3
Click TACACS+ Defaults link on the left pane.
The TACACS+ Defaults page appears
Step 4
Step 5
Check the TACACS+ Authentication Disabled check box.
Click Submit.
Note
The authentication setting for other Cisco BAC users will not be affected by this tool. You must use the
TACACS+ server administrative procedure to change the passwords.
Using the runEventMonitor.sh Tool
You can run the runEventMonitor.sh tool to view the events that are being fired in Cisco BAC. You can
run this tool from the BPR_HOME/rdu/internal/bin directory.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
20-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 20 Cisco BAC Support Tools and Advanced Concepts
Using the runEventMonitor.sh Tool
Table 20-1 describes the types of events that you can view from the event monitor:
Table 20-1
Events that can be viewed from the Event Monitor
Event
Sub-Event
Description
Batch
Completion
Displays when a batch submitted by a
client application ends. Contains the
batch status.
Class of service
Class of service
Configuration
Configuration
New
Indicates when a class of service is added
to the system.
Deleted
Generated
Indicates when a class of service is
deleted from the system.
Indicates when a configuration is
generated.
Uncommitted
Generated
Indicates when a configuration that is
temporarily stored at the DPE is
generated.
Configuration
Rollback
Indicates that the uncommitted
configuration should be discarded from
the DPE.
Uncommitted
Device
Device
Changed Class Of Service
Changed IP Address
Indicates when a device changes its Class
of Service.
Indicates when a device's IP address
changes.
Device
Device
Deleted
Indicates when a device is deleted.
Deleted Voice Service
Indicates when a voice service is deleted
from a device.
Device
New Provisioned Device
Indicates when a device is added through
the provisioning API.
Device
New Unprovisioned Device Indicates when a device is added when
booting on the network.
Device
New Voice Service
Roaming
New
Indicates when a voice service is added to
a device
Device
Indicates when a device roams
provisioning groups.
DHCP Criteria
DHCP Criteria
External File
External File
External File
Indicates when a DHCP criteria is added
to the system.
Deleted
Indicates when a DHCP criteria is deleted
from the system.
Added
Indicates when a file is added to the
system.
Deleted
Indicates when a file is deleted from the
system.
Replaced
Indicates when a file is replaced in the
system.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
20-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 20 Cisco BAC Support Tools and Advanced Concepts
Using the runEventMonitor.sh Tool
Table 20-1
Events that can be viewed from the Event Monitor (continued)
Event
Sub-Event
Description
Messaging
Connection Up
Indicates when a connection on the local
instance of the messaging system starts.
Messaging
Messaging
Connection Down
Queue Full
Indicates when a connection on the local
instance of the messaging system stops.
Indicates when the queue on the local
instance of the messaging system is full
and starts dropping messages.
Provisioning Group
Server Properties
Changed
Indicates when the provisioning group is
changed.
Common Properties
Server Defaults Changed
Indicates when common properties that
effect the RDU or DPE change.
System Configuration
System Configuration
System Configuration
Indicates when properties are changed on
an user, RDU, or DPE.
System Configuration
Changed
Indicates when the system configuration
is changed.
System Defaults Changed
Indicates when defaults are changed.
Syntax Description
To run the event monitor, enter:
# /opt/CSCObac/rdu/internal/bin/runEventMonitor.sh [options]
Options are used to specify the RDU connection parameters and amount of output. You have the
following options:
• -noverbose—Forces the event monitor to display only the types of events being fired, not their
contents.
• -host host—Specifies the host where the RDU is located. Default is the localhost.
• -port port—Specifies the port on which the RDU is listening. Default is 49187.
Example 20-5 Sample Event Monitor Output.
If need help, please restart command with '?' parameter.
Verbose mode: true
RDU host: localhost
RDU port: 49187
Connecting to RDU...ok
Listening for events...
ExternalFileEvent added filename=gold.cm
rev=1014671115124(Mon Feb 25 16:05:15 EST 2002)
source=BPR Provisioning API:BPR Regional Distribution Unit:AddExternalFile command
DeviceEvent newProvDevice ID=1,6,01:02:03:04:05:06
rev=1014671179380(Mon Feb 25 16:06:19 EST 2002)
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
20-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 20 Cisco BAC Support Tools and Advanced Concepts
Using the changeARProperties.sh Tool
source=BPR Provisioning API:BPR Regional Distribution Unit:AddIPDevice command IP=null
FQDN=null group=null
Using the changeARProperties.sh Tool
The Cisco BAC installation program establishes values for configuration properties used by Cisco BAC
extensions that are incorporated into the Access Registrar RADIUS server. You use the
changeARProperties.sh command, which is found in the BPR_HOME/car_ep/bin directory, to change
key configuration properties.
Invoking the script without any parameters displays a help message listing the properties that can be set.
To run this command:
Step 1
Step 2
Change directory to BPR_HOME/car_ep/bin.
Run the changeARProperties.sh command using this syntax:
changeNRProperties.sh options
Where options are:
–
–
–
–
–
–
–
–
–
–
-help—Displays this help message. The -help option must be used exclusively. Do not use this
with any other option.
-d—Displays the current properties. The -d option must be used exclusively. Do not use this
with any other option.
-s secret—Identifies the Cisco BAC shared secret. For example, if the shared secret is the
word secret, enter -s secret.
-q queue_size —Identifies the maximum number of the Access-Requests to be queued. For
example, if you want to set the queue size to 1000, enter -q 1000.
-t thread_count—Identifies the maximum number of threads to be used to process the
requests. For example, if you want to set the thread count to 10, enter -t 10.
-host addr—Identifies the DPE Auth HTTP interface you want to use. For example, if you want
to use the interface localhost, enter -host localhost.
-port port—Identifies the DPE Auth HTTP interface port you want to use. For example, if you
want to use the port 7551, enter -port 7551.
-url url—Identifies the DPE Auth HTTP service url you want to use. For example, if you want
to use the url /auth, enter -url /auth.
-ssl enabled|disabled—Enables or disables the SSL/TLS connection between CAR and DPE.
Enter -ssl enabled to enable it and -ssl disabled to disable it.
-x [true/false]—Enables or disables XML Schema validation e.g. -x true
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
20-8
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 20 Cisco BAC Support Tools and Advanced Concepts
Using the changeNRProperties.sh Tool
Using the changeNRProperties.sh Tool
The Cisco BAC installation program establishes values for configuration properties used by Cisco BAC
extensions that are incorporated into the Network Registrar DHCP server. You use the
changeNRProperties.sh command, which is found in the BPR_HOME/cnr_ep/bin directory, to change
key configuration properties.
Invoking the script without any parameters displays a help message listing the properties that can be set.
To run this command:
Step 1
Step 2
Change directory to BPR_HOME/cnr_ep/bin.
Run the changeNRProperties.sh command using this syntax:
changeNRProperties.sh options
Where options are:
•
-help—Displays this help message. The -help option must be used exclusively. Do not use this with
any other option.
•
-d—Displays the current properties. The-d option must be used exclusively. Do not use this with any
other option.
• -s secret—Identifies the Cisco BAC shared secret. For example, if the shared secret is the word
secret, enter -s secret.
• -f fqdn—Identifies the RDU FQDN. For example, if you use rdu.example.com as the fully qualified
domain name, enter -f rdu.example.com.
• -p port—Identifies the RDU port you want to use. For example, if you want to use port number
49187, enter -p 49187.
• -g prov_group—Identifies the provisioning group. For example, if you are using provisioning
group called group1, enter -g group1.
Examples
This is an example of changing the Network Registrar extensions by using the NR Extensions Properties
tool:
#sh changeNRProperties.sh -g primary1
Current NR Properties:
RDU Port: 49187
RDU FQDN: rdu.example.com
Provisioning Group: primary1
Shared Secret: fggTaLg0XwKRs
Note
You must restart your NR DHCP server for the changes to take effect.
This is an example of viewing the current properties:
#sh changeNRProperties.sh -d
Current NR Properties:
RDU Port: 49187
RDU FQDN: rdu.example.com
Provisioning Group: primary1
Shared Secret: fggTaLg0XwKRs
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
20-9
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 20 Cisco BAC Support Tools and Advanced Concepts
Using the changeNRProperties.sh Tool
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
20-10
Download from Www.Somanuals.com. All Manuals Search And Download.
C H A P T E R
21
Troubleshooting Broadband Access Center
This chapter provides the information on how to observe the RDU and DPE logs, and troubleshoot Cisco
BAC.
This chapter includes the following sections:
•
•
Troubleshooting Checklist
Table 21-1
Troubleshooting Checklist
Procedure
Refer to ...
which Cisco BAC components are installed.
2. Check the Cisco BAC component logs for indications of
high-severity errors. These include the information logged for:
–
–
RDU
DPE
3. View server uptime from the administrator user interface to
confirm that the servers are not bouncing.
4. View the RDU and DPE service performance statistics from the
administrator’s user interface. Observe any abnormal numbers,
such as extended transaction times.
5. Check the syslog alerts log.
6. Check the operating system and hardware resources, such as:
–
–
–
Disk space
CPU time
Memory
Solaris documentation for
specific commands.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
21-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 21 Troubleshooting Broadband Access Center
Logging
Table 21-1
Troubleshooting Checklist (continued)
Procedure
Refer to ...
8. If troubleshooting a specific device, view the device instructions The show device-config
that are cached at the DPE.
command described in the
9. Configure individual device troubleshooting from the
troubleshooting log.
10. View device fault data for the system, the RDU, the DPE, or a
specific device.
DPE for detailed logging information.
The log level command as
described in the Cisco
Logging
Logging of events is performed at both the DPE and RDU, and in some unique situations, DPE events
are logged at the RDU to give them higher visibility. Log files are located in their own log directories
and can be examined using any text file viewer. The files can be compressed to allow them to be easily
e-mailed to the TAC or system integrators for troubleshooting and fault resolution.
This section describes:
•
•
•
•
•
•
•
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
21-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 21 Troubleshooting Broadband Access Center
Logging
Log Levels and Structures
•
•
Domain Name—This is the name of the computer generating the log files.
Date and Time—This is the date on which a message is logged. This information also identifies the
applicable time zone.
•
•
•
Facility—This identifies the system which, in this case is the Cisco BAC.
Sub-facility—This identifies the Cisco BAC subsystem or component.
Security Level—The logging system defines seven levels of severity (log levels as described in
Table 21-2) that are used to identify the urgency with which you might want to address log issues. The
Table 21-2
Logging Levels
Log Level
Description
0-Emergency
System unstable. Sets the logging function to save all
emergency messages.
1-Alert
Immediate action needed. Sets the logging function to save
all activities that need immediate action and those of a more
severe nature.
2-Critical
3-Error
Critical conditions exist. Sets the logging function to save all
error messages and those of a more severe nature
Error conditions exist. Sets the logging function to save all
error messages and those of a more severe nature.
4-Warning
5-Notification
Warning conditions exist. Sets the logging function to save all
warning messages and those of a more severe nature.
A normal, but significant, condition exists. Sets the logging
function to save all notification messages and those of a more
severe nature
6-Information
Informational messages. Sets the logging function to save all
logging messages available
Note
Another level known as 7-DEBUG is used exclusively by Cisco for debugging purposes. Do
not use this level except at the direction of the Cisco TAC.
•
•
Msg ID—This is a unique identifier for the message text.
Message—This is the actual log message.
Example 21-1 Sample Log File
Domain
Name
Sub-
Security
Data and Time
Facility facility Level
Msg ID Message
BAC1:
BAC1:
BAC1:
2006 04 21 07:28:00 EDT: BAC- RDU-
2006 04 21 07:28:00 EDT: BAC- RDU-
2006 04 21 07:28:00 EDT: BAC- RDU-
6
6
6
0236:
0566:
0568:
BAC Regional Distribution Unit starting up
Initialized API defaults
Initialized server defaults
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
21-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 21 Troubleshooting Broadband Access Center
Logging
Domain
Name
Sub-
Security
Data and Time
Facility facility Level
Msg ID Message
BAC1:
BAC1:
BAC1:
BAC1:
BAC1:
2006 04 21 07:28:00 EDT: BAC- RDU-
2006 04 21 07:28:00 EDT: BAC- RDU-
2006 04 21 07:28:00 EDT: BAC- RDU-
2006 04 21 07:28:00 EDT: BAC- RDU-
2006 04 21 07:28:00 EDT: BAC- RDU-
6
6
6
6
6
0569:
0574:
0575:
0015:
0280:
Created default admin user
Loaded 6 license keys
Database initialization completed in 471 msec
Unable to locate manifest file
Command error
Configuring Log Levels
You can configure logging levels for both the RDU and the DPE to suit your specific requirements. For
example, the logging level for the RDU could be set to Warning, and the level for the DPE could be set
to Alert.
Log messages are written based on certain events taking place. Whenever an event takes place, the
appropriate log message and level are assigned and, if that level is less than or equal to the configured
level, the message is written to the log. The message is not written to the log if the level is higher than
the configured value.
For example, assume that the log level is set to 4-Warning. All events generating messages with a log
level of 4 or less, are written into the log file. If the log level is set to 6-Information, the log file will
receive all messages. Consequently, configuring a higher log level results in a larger log file size.
To configure the log level on the DPE, using the log level command from the DPE command line. See
Rotating Log Files
All log files, except perfstat.log, are numbered and rolled over based on a configured maximum file size.
The default maximum file size is 10 MB. (To configure the maximum file size from the API, use the
ServerDefaultsKeys.SERVER_LOG_MAXSIZEproperty.) After a log file touches the configured limit, the
data is rolled over to another file. This file is renamed in the XXX.N.log format, where:
•
•
XXX—Specifies the name of the log file.
N—Specifies any value between 1 and 100.
For example, once rdu.log reaches the 10 MB limit, it is renamed as rdu.1.log. With every 10-MB
increase in file size, the latest file is renamed as rdu.2.log, rdu.3.log, and so on. So, the rdu.7.log file will
contain data more recent than rdu.4.log. However, the latest log information is always stored in rdu.log.
In the case of the perfstat.log file, the file is renamed everyday. The file is rolled over in the perfstat.N.log
format, where N is any value between 1 and 100. For example, perfstat.100.log will be the oldest log
while perfstat.1.log will be the most recent renamed perfstat.log file.
Cisco BAC stores up to 10 log files at a given time. For a list of log files in the RDU and DPE servers,
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
21-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 21 Troubleshooting Broadband Access Center
Logging
RDU Logs
The RDU has two logs that it maintains in the BPR_DATA/rdu/logs directory:
•
•
•
audit.log—Records all high-level changes to the Cisco BAC configuration or functionality including
troubleshooting.log—Records detailed device information for troubleshooting a specific device, or
a group of devices without turning logging on, and without searching through log files for device-
or group-specific information. To view troubleshooting.log from the administrator user interface,
•
perfstats.log—Records device performance statistics to help troubleshoot issues related to system
Viewing the rdu.log File
You can use any text processor to view the rdu.log file. In addition, you can view the log file from the
administrator user interface. To do this:
Step 1
Step 2
Choose the RDU tab under Servers.
The View Regional Distribution Unit Details page appears.
Click the View Details icon ( ) corresponding to RDU Log File.
The View Log File Contents page appears, displaying data from rdu.log.
Viewing the audit.log File
You can use any text processor to view the audit.log file. In addition, you can view the log file from the
administrator user interface. To do this:
Step 1
Step 2
Choose the RDU tab under Servers.
The View Regional Distribution Unit Details page appears.
Click the View Details icon corresponding to Audit Log File.
The View Log File Contents page appears, displaying data from audit.log.
The RDU Log Level Tool
Use the RDU log level tool to change the current log level of the RDU from the command line, using the
identifies the available log levels and the types of message written to the log file when enabled.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
21-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 21 Troubleshooting Broadband Access Center
Logging
We recommend that you keep the RDU logging level at the Warning level to help maintain a steady
operations state. The Information level is recommended to be used with caution if you need to maintain
steady state performance during debug operations.
You should exercise caution when running with the Information level set because this creates a great
number of log entries, which in itself can adversely impact performance.
Note
The RDU process has to be up to execute the log level tool. Also, you must be a privileged user to run
this tool by using the setLogLevel.sh command.
Using the RDU Log Level Tool
All examples assume that the user name for the RDU is bacadmin, the password for the RDU is
changeme, and the RDU server is up.
Enter this command to run the RDU log level tool:
setLogLevel.sh [0..6] [-help] [-show] [-default] [-debug]
where:
•
•
•
•
•
-help—Displays help for the tool.
-show—Displays the current log level set for the RDU server.
-default—Sets the RDU to the installation default level 5 (notification).
-debug— Sets an interactive mode to enable or disable tracing categories for RDU server.
Note
You should only enable the debug settings that the Cisco support staff recommends.
You can also use this tool to perform these functions:
•
•
Setting the RDU Log Level
You can use this tool to change the logging level from one value to any other value.
The following example illustrates how to set the RDU logging level to the warning level, as indicated by
the number 4 in the setLogLevel.sh command. The actual log level set is not important for the procedure,
it can be interchanged as required.
To set the RDU logging level:
Step 1
Step 2
Change directory to BPR_HOME/rdu/bin.
Run the RDU log level tool using this command:
setLogLevel.sh 4
This prompt appears:
Please type RDU username:
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
21-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 21 Troubleshooting Broadband Access Center
Logging
Step 3
Step 4
Enter the RDU username at the prompt. In this example, the default username (bacadmin) is used.
Please type RDU username: bacadmin
This prompt appears:
Please type RDU password:
Enter the RDU password for the RDU at the prompt. In this example, the default password (changeme)
is used.
Please type RDU password: changeme
This message appears to notify you that the log level has been changed. In this example, the level was
5, for notification, and is now 4, for warning.
RDU Log level was changed from 5 (notification) to 4 (warning).
Viewing the RDU’s Current Log Level
You can use this tool to view the RDU log and determine which logging level is configured before
attempting to change the value.
To view the RDU’s current logging level:
Step 1
Step 2
Change directory to BPR_HOME/rdu/bin.
Run this command:
setLogLevel.sh -show
This prompt appears:
Please type RDU username:
Step 3
Step 4
Enter the RDU username (bacadmin) and press Enter.
Please type RDU username: bacadmin
This prompt appears:
Please type RDU password:
Enter the RDU password (changeme) and press Enter.
Please type RDU password: changeme
This message appears:
The logging is currently set at level: 4 (warning)
All tracing is currently disabled.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
21-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 21 Troubleshooting Broadband Access Center
Logging
DPE Logs
The DPE maintains its logs at the BPR_DATA/dpe/logs directory.
•
dpe.log—Records all events having the configured default level. In situations where the DPE
undergoes catastrophic failure, such as engaging in a series of system crashes, the catastrophic errors
are also logged into the rdu.log file.
•
perfstats.log—Records device performance statistics to help troubleshoot issues related to system
Viewing the dpe.log File
You can use any text viewer to view the dpe.log file. In addition you can use the show log command,
from the DPE CLI, to view the log file. See the Cisco Broadband Access Center 3.8 DPE CLI Reference,
for additional information.
You can also view the DPE log file using the Cisco BAC administrator user interface. To do this:
Step 1
Step 2
Choose Servers > DPEs.
Click the link corresponding to the DPE whose log file you want to view.
The View Device Provisioning Engines Details page appears.
Step 3
To view the contents of the dpe.log file, click the View Details icon against DPE Log File in the Log
Files area.
Access Registrar Logs
Cisco BAC generates trace messages from Cisco Access Registrar RADIUS server extensions. The
RADIUS server trace resides in the car-install-path/name_radius_1_trace directory; car-install-path
is a variable and is specific to the value that you enter. The default location for the RADIUS server log
file is /opt/CSCOar/logs/name_radius_1_trace.
The trace messages emitted using the RADIUS server extensions are based on the extension trace level
setting. You can set values (described in Table below) at the trace level; the number you set makes that
number the current setting of the extension-trace-level attribute for all extensions.
Use the aregcmd command trace to set the trace level in the specified server to a new value. The trace
level governs how much information is displayed about the contents of a packet. When the trace level is
zero, no tracing is performed. The higher the trace level, the more information displayed. The highest
trace level currently used by the CAR server is trace level 5.
Note
Although the highest trace level supported by the CAR server is trace level 5, an extension point script
might use a higher level. There is no harm in setting the trace to a level higher than 5.
The trace levels are inclusive, meaning that if you set trace to level 3, you will also get the information
reported for trace levels 1 and 2. If you set trace level 4, you also get information reported for trace levels
1, 2, and 3. When you do not specify a server, CAR sets the trace level for all of the servers in the current
cluster. When you do not specify a value for the trace level, CAR displays the current value of the trace
level. The default is 0.
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
21-8
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 21 Troubleshooting Broadband Access Center
Logging
The syntax for setting the trace level is:
trace [server] [level]
Table 21-3
Trace Levels
Log Level
Description
0
1
No trace performed.
Report when a packet is sent or received or when there is a change in a remote
server's status.
2
Indicates the following:
•
•
•
Which services and session managers are used to process a packet
Which client and vendor objects are used to process a packet
Detailed remote server information for LDAP and RADIUS, such as
sending a packet and timing out
•
•
Details about poorly formed packets
Details included in trace level 1
3
4
5
Indicates the following:
•
•
•
•
Error traces in TCL scripts when referencing invalid RADIUS attributes.
Which scripts have been executed
Details about local UserList processing
Details included in trace levels 1 and 2
Indicates the following:
•
•
•
•
Information about advanced duplication detection processing
Details about creating, updating, and deleting sessions
Trace details about all scripting APIs called
Details included in trace levels 1, 2, and 3
Indicates the following:
•
Details about use of the policy engine including:
–
–
–
–
Which rules were run
What the rules did
If the rule passed or failed
Detailed information about which policies were called
•
Details included in trace levels 1, 2, 3, and 4
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
21-9
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 21 Troubleshooting Broadband Access Center
Logging
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
21-10
Download from Www.Somanuals.com. All Manuals Search And Download.
G L O S S A R Y
A
A syslog or SNMP message notifying an operator or administrator of a problem.
alert
API
Application programming interface. Specification of function-call conventions that defines an interface
to a service.
A log file containing a summary of major changes in the RDU database. This includes changes to
system defaults, technology defaults, and classes of service.
audit logs
A server that provisions a device or a collection of devices. In Cisco BAC, the ACS refers to the Cisco
BAC server and in some instances, the DPE.
autoconfiguration
server (ACS)
B
Transmission system that multiplexes multiple independent signals onto one cable. In
Telecommunications terminology; any channel having a bandwidth greater than a voice-grade channel
(4 kHz). In LAN terminology; a co-axial cable on which analog signaling is used.
broadband
An integrated solution for managing and provisioning broadband home networks. BAC is a scalable
Cisco Broadband
Access Center (BAC) product capable of supporting millions of devices.
C
Form of replication in which information learned during a previous transaction is used to process later
caching
transactions.
Provide cryptographic algorithms that the SSL module requires to perform key exchange,
authentication, and Message Authentication Code.
cipher suites
Terminating equipment, such as telephones, computers, and modems, supplied and installed at a
customer location.
customer premises
equipment (CPE)
A standard defined in the TR-069 specification by the Broadband Forum. CWMP integrates the
capabilities defined in TR-069 to increase operator efficiency and reduce network management
problems.
CPE WAN
Management
Protocol (CWMP)
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
GL-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Glossary
D
DPE servers cache device instructions and perform CWMP services. These distributed serves
automatically synchronize with the RDU to obtain the latest instructions and provide Cisco BAC
scalability.
device provisioning
engine (DPE)
F
FQDN is the full name of a system, rather than just its hostname. For example, cisco is a hostname and
www.cisco.com is an FQDN.
fully qualified
domain name
(FQDN)
H
See Secure Sockets Layer and Transport Layer Security.
HTTPS
I
The process of generating policy instructions at the RDU for devices and distributing these instructions
to the DPE. The instructions are cached by the DPE and informed about action needed to be performed
on the CPE, which may include configuration, firmware upgrade or other operations.
instruction
generation
An IP address is a 32-bit number that identifies each sender or receiver of information that is sent in
packets across the Internet.
IP address
N
Mechanism for reducing the need for globally unique IP addresses. NAT allows an organization with
addresses that are not globally unique to connect to the Internet by translating those addresses into
globally routeable address space. This is also known as Network Address Translation.
network address
translation (NAT)
Person responsible for operation, maintenance, and management of a network. See also network
network
administrator
operator.
Person who routinely monitors and controls a network, performing such tasks as reviewing and
responding to alarms, monitoring throughput, configuring new circuits, and resolving problems. See
also network administrator.
network operator
NTP is a protocol designed to synchronize server clocks over a network.
Network Time
Protocol (NTP)
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
GL-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Glossary
P
A series of Cisco BAC functions that programs can use to make the operating system perform various
functions.
provisioning API
Groupings of devices with a defined set of associated DPE servers, based on either network topology
or geography.
provisioning groups
publishing
Publishing provides provisioning information to an external datastore in real time. Publishing plug-ins
must be developed to write data to a datastore.
R
In internetworking, the duplication of devices, services, or connections so that, in the event of a failure,
the redundant devices, services, or connections can perform the work of those that failed.
redundancy
The RDU is the primary server in the Cisco BAC provisioning system. It manages generation of device
instructions, processes all API requests, and manages the Cisco BAC system.
regionaldistribution
unit (RDU)
S
A protocol for transmitting private documents via the Internet. SSL uses a cryptographic system that
uses two keys to encrypt data: a public key known to everyone and a private or secret key known only
to the recipient of the message. By convention, URLs that require an SSL connection start with https:
instead of http:. BAC 3.0 supports SSLv3.
Secure Sockets
Layer (SSL)
See Transport Layer Security.
A character string used to provide secure communication between two servers or devices.
shared secret
T
XML files that contain configuration or firmware rules for devices.
template files
A protocol that guarantees privacy and data integrity between client/server applications communicating
over the Internet. BAC 3.0 supports TLSv1.
Transport Layer
Security (TLS)
See Secure Sockets Layer.
A standard which defines the CPE WAN Management Protocol (CWMP), which enables
communication between CPE and an autoconfiguration server.
TR-069
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
GL-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Glossary
V
Mechanism to make telephone calls and send faxes over IP-based data networks with a suitable quality
of service (QoS) and superior cost/benefit.
Voice over IP (VoIP)
W
A watchdog agent is a daemon process that is used to monitor, stop, start and restart Cisco BAC
component processes such as the RDU, JRun, and the SNMP agent.
watchdog agent
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
GL-4
Download from Www.Somanuals.com. All Manuals Search And Download.
I N D E X
A
ACS
relating to
definition GL-1
administrator user interface
accessing 15-2
DPE 11-2
RDU 11-2
configuring 15-1
architecture 2-1 to ??, 2-8
agents
SNMP 9-6
deployment 2-1
adding 7-5
logging 21-2, 21-3
overview 2-2, 2-4
deleting 7-6
authentication
replacing 7-6
viewing 7-6
performance statistics, collecting
RDU extensions, managing
advanced concepts
about 13-13
autoconfiguration server
agent, SNMP
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
IN-1
Download from Www.Somanuals.com. All Manuals Search And Download.
Index
using 5-23
B
features 5-4
notification 5-8
C
cautions
parameters 5-6, 5-7
prerequisites 5-9, 5-13
regarding
network deployment with an evaluation license
key 17-20
configuration workflows and checklists
component workflows
cipher suites
technology workflows
definition GL-1
classes of service
about 4-3
configuring
adding 17-3
RDU configuration, preregistering device
deleting 17-4
data 3-4
modifying 17-3
configuring BAC
client certificate authentication
configuring 13-16
class of service
adding 17-3
command line interface
configuration history
deleting 17-4
modifying 17-3
authentication 12-3
disabling 12-10
configuration template
about 5-1
reachability 12-11
CWMP service
authoring 5-14
configuration utility
about 5-22
defaults
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
IN-2
Download from Www.Somanuals.com. All Manuals Search And Download.
Index
CWMP 17-7
RDU 17-10
system 17-11
automatic 4-20
device history
viewing 8-4
explicit 4-20
preregistered 4-17
discovering device data
about 12-11
parameters 12-12, 12-13
files, managing
unregistered 4-17
overview 4-1
adding 17-17
deleting 17-19
exporting 17-19
replacing 17-18
custom properties
viewing 17-18
provisioning data, publishing
RDU extensions, managing
viewing 17-26
configuring 17-5
overview 5-15
CWMP
about 1-3
definition GL-1
authentication 12-3
disabling 12-10
reachability 12-11
connection request service
about 12-2
authentication 12-3
disabling 12-10
discovering device data
about 12-11
methods 12-5, 12-7
discovered 12-5
parameters 12-12, 12-13
troubleshooting 12-13
reachability 12-11
certificates for client authentication,
importing 13-10
CPE management
authentication 13-13
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
IN-3
Download from Www.Somanuals.com. All Manuals Search And Download.
Index
server certificate and private key,
generating 13-6
Device Export
device faults
signed certificate into server certificate,
importing 13-9
about 8-6
device history
about 8-1
signing authority certificate into cacerts,
importing 13-8
about 13-1
viewing 8-4
device management
D
about 16-10
administrator user interface, using
adding 16-11
database management
backup and recovery
deleting 16-11
recovering 10-5
modifying 16-11
restoring 10-6
rebooting 16-15
controls 16-7
DB_VERSION 10-3
storage 10-2
defaults, configuring
CWMP 17-7
device object model
RDU 17-10
system 17-11
device diagnostics
overview 4-21
overview 4-2
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
IN-4
Download from Www.Somanuals.com. All Manuals Search And Download.
Index
device operations
certificates for client authentication,
importing 13-10
about 14-1
connection modes
server certificate and private key,
generating 13-6
asynchronous 14-5
signed authority certificate into cacerts,
immediate 14-2
on-connect 14-3
importing 13-8
signed certificate into server certificate,
importing 13-9
correcting 14-8
load balancing
device troubleshooting
about 8-9
SSL
configuring 8-10
disabling 8-11
about 13-11
enabling 8-10
configuring 13-11
states 19-4
disk space monitoring
documentation
technology workflow checklist
viewing
audience 2-xv
DPE (Device Provisioning Engine)
about 2-4
definition GL-2
F
firmware
about 6-1
files, managing
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
IN-5
Download from Www.Somanuals.com. All Manuals Search And Download.
Index
I
instructions
firmware rules template
authoring 6-6
IP address
constructs 6-13
expressions 6-7
definition GL-2
sample 6-11
K
keystore
upgrade
forcing 16-17
FQDN
definition GL-2
certificates for client authentication,
importing 13-10
G
server certificate and private key,
generating 13-6
group, managing
group types
signed certificate into server certificate,
deleting 16-20
importing 13-9
groups, managing
signing authority certificate into cacerts,
importing 13-8
about 16-20
adding 16-20
deleting 16-21
adding 16-19
L
modifying 16-20
modifying 16-21
logging
about 2-7
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
IN-6
Download from Www.Somanuals.com. All Manuals Search And Download.
Index
setting 21-6
scalability 1-2
security 1-2
P
parameter dictionary
adding 7-5
using 21-6
viewing log files
audit.log 21-5
deleting 7-6
dpe.log 21-8
replacing 7-6
perfstat.log 11-15
viewing 7-6
rdu.log 21-5
custom 7-3
troubleshooting.log 8-12
default 7-2
overview 7-1
syntax 7-3
M
provisioning data, publishing
N
initial configuration
provisioning groups
about 2-6
network address translation
definition GL-3
O
overview
automatic 4-20
explicit 4-20
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
IN-7
Download from Www.Somanuals.com. All Manuals Search And Download.
Index
redundancy 12-16
local 12-16
prerequisite 5-10
Secure Sockets Layer
regional 12-16
R
security
RDU (Regional Distribution Unit)
about 2-4
alerts 11-2
DPE
definition GL-3
extensions, managing
performance statistics collection
monitoring 11-14
viewing 17-26
RDU
setting 21-6
DPEs 16-22
using 21-6
service classes
shared secret
configuring
local 12-16
definition GL-3
regional 12-16
SNMP agent
S
about 2-7
schema (figures)
configuration 5-4
parameter 5-6
snmpAgentCfgUtil.sh tool
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
IN-8
Download from Www.Somanuals.com. All Manuals Search And Download.
Index
definition GL-3
tools and advanced concepts
configuration utility
running 5-23
starting 11-9
stopping 11-9
SSL
configuring 13-3, 13-11
definition GL-3
setting 21-6
using 21-6
synchronization
Transport Layer Security
DPE-RDU 19-3
T
template files, developing
templates
configuration 5-1, 5-13
configuration utility
running 5-23
constructs
troubleshooting
alert messages
DPE 11-2
conditionals 5-19
authoring 6-6
constructs 6-13
TLS
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
IN-9
Download from Www.Somanuals.com. All Manuals Search And Download.
Index
devices
servers, viewing
performance statistics collection
monitoring 11-14
user management
perfstat.log 11-15
V
U
users
W
about 16-1
administrator 16-1
managing
watchdog process
about 2-7, 9-1
adding 16-2
alerts 11-4
deleting 16-4
modifying 16-3
using BAC
devices, managing
about 16-10
adding 16-11
controls 16-7
deleting 16-11
modifying 16-11
groups, managing
adding 16-20
deleting 16-21
modifying 16-21
Cisco Broadband Access Center 3.8 Administrator Guide
OL-27172-01
IN-10
Download from Www.Somanuals.com. All Manuals Search And Download.
|