Cornerstone: CMTS 1500 Version 4.2 Release Notes and Letter of Operational Considerations
Cornerstone: CMTS 1500 Version 4.2 Release Notes and Letter of Operational Considerations
Cornerstone: CMTS 1500 Version 4.2 Release Notes and Letter of Operational Considerations
CMTS 1500 Version 4.2 Release Notes and Letter of Operational Considerations
Release 4.2 ARSVD00382 Standard 1.8 June 2002
Cornerstone
Cable Modem Termination System 1500 Software Version 4.2 Release Notes and Letter of Operational Considerations
Document number Document release Document date ARSVD00382 Release 1.8 June 2002
The information in this document is subject to change without notice. The statements, configurations, technical data, and recommendations in this document are believed to be accurate and reliable, but are presented without express or implied warranty. User must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to ARRIS. ARRIS, ARRIS Interactive, and Voice Port are trademarks of ARRIS Licensing Company. Cornerstone is a registered trademark of ARRIS Licensing Company. The software described in this document is furnished under a license agreement and may only be used in accordance with the terms of that license.
Publication history
June 2002
Standard 1.8 version of this document
Table of contents
1 Objectives of this Document __________________________________________ 1 1.1 ARRIS Commitment ______________________________________________ 1 1.2 Purpose and Scope of this Release ___________________________________ 1 1.3 Product Identification______________________________________________ 1 1.4 Product Documentation ____________________________________________ 1 2 Release Notes ______________________________________________________ 2 2.1 New Features ____________________________________________________ 2.1.1 DOCSIS 1.1 Functionality _______________________________________ 2.1.2 Quality-of-Service______________________________________________ 2.1.3 Payload Header Suppression (PHS) ________________________________ 2.1.4 Committed Information Rate (CIR) _________________________________ 2.1.5 Mode B Forwarding __________________________________________ 2.1.6 Proxy-ARP server _____________________________________________ 2.1.7 Funnel Mode _________________________________________________ 2.1.8 ARP Spoofing Protection ________________________________________ 2.1.9 CM Only DHCP Relay ________________________________________ 2.1.10 User Specified Aging Interval for De-Registered CMs ___________________ 2.1.11 User Specified Aging Interval for Ranged-But-Not-Registered CMs ________ 2.1.12 Purging Ethernet and CPE Entries __________________________________ 2.1.13 Enhanced Initial Ranging Opportunities ______________________________ 2.1.14 Modem State command _________________________________________ 2.1.15 Signal-To-Noise Ratio (SNR) MIB implementation_____________________ 2 2 2 2 2 2 2 3 3 3 3 3 3 3 4 4
2.2 Resolved Operational Considerations ________________________________ 4 3 Letter of Operational Considerations___________________________________ 6 3.1 Software Compatibility with the CMTS 1500 Hardware __________________ 6 3.2 Descriptions of Operational Considerations ____________________________ 6 3.2.1 Bootp-Relay counter does not update properly ________________________ 6 3.2.2 SnmpInvalidMessage counter does not function properly._________________ 6 3.2.3 SnmpUnknownPDUHandlers counter does not increment _______________ 7 3.2.4 SnmpUnknownSecurityModels counter does not increment ______________ 7 3.2.5 Cannot set message size if snmpTargetAddr table status is active ___________ 7 3.2.6 SNMP Notification filters are not working ____________________________ 8 3.2.7 SSH host-key and server-key need to be regenerated at the same time ______ 8 3.2.8 CLI limitation where it is unable to enter the max string length (255) for the taglist. 9
3.2.9
Docsistrapcontrol (docsDevCmtsTrapControl) value in putmng output is incorrect 9 3.2.10 send-inform (lcdocsCmtsTrapTypeControl) value in putmng output is incorrect 11 3.2.11 After creating a v3 user and cloning it to AuthPrivMD5/SHA, upon reset the protocols can change. ________________________________________________ 11 3.2.12 When creating SNMPv3 users you have to change the V3 passwords before the accounts can be turned on. ____________________________________________ 12 3.2.13 After setting a SNMPv3 user to no auth and no priv protocols, the auth protocol can not be set or cloned ______________________________________________ 12 3.2.14 SSH host/server bits values lost___________________________________ 12 3.2.15 Reset on invalid QoS Parameter __________________________________ 13 3.2.16 Ingress Avoidance frequency switching unavailability ___________________ 13 3.2.17 Upstream loss in constant frequency changes _________________________ 14 4 Customer Service and Support _______________________________________ 15
Page 1 of 22
2 Release Notes
2.1 New Features
The Cornerstone CMTS 1500 software v4.2 provides additional features built upon the proven technology operators have already experienced. The Features section will identify the commands and functions built into this software. Further information that will expand upon these descriptions can be found in the Cornerstone CMTS 1500 product documentation.
2.1.1
The v4.2 software release is CableLabs compliant with DOCSIS 1.1 specification.
2.1.2
Quality-of-Service
Quality of Service supports multiple service levels in the network. Release v4.2 is DOCSIS 1.1 compliant, which supports of the ability to create, admit and activate service flows when needed and delete service flows when no longer required. In addition to supporting VoIP applications, Release v4.2 software also lets cable operators provide enhanced IP data services.
2.1.3
Payload Header Suppression (PHS) helps optimize network performance by reducing the packet size used. PHS removes repetitive information from an IP (Internet Protocol) packet on a continuous data stream destined for the same location.
2.1.4
The Committed Information Rate (CIR) service provides the cable modem downstream traffic with a minimum level of service at the Service Flow level. The committed level may be exceeded with additional traffic being forwarded as best effort.
2.1.5
Mode B Forwarding
Mode B Forwarding instructs the CMTS to learn the IP address, MAC address, CM Security AssociationID, and lease-time from the DHCP discover and offer process. The information is then aged out by the learned lease-time of the cable modem and customer premises equipment.
2.1.6
Proxy-ARP server
With Mode B Forwarding enabled, the CMTS operates as a proxy Address Resolution Protocol server by intercepting all ARP packets. On receiving an ARP for a device not within the Forwarding Database, the CMTS issues the ARP request for the destination IP address. When the reply is received, the CMTS will update its Forwarding Database and respond to the requesting device.
Page 2 of 22
2.1.7
Funnel Mode
Funnel Mode gives the operator the ability to direct IP packets that originate from the Cornerstone CMTS units RF network and which are destined back to the RF network to be funneled out onto the Ethernet network. The IP packets are then directed to an IP Address for traffic shaping (i.e. permission server).
2.1.8
The ARP Spoofing feature will help prevent IP address theft. When a CPE device tries to use an IP address not assigned by the DHCP service, the CMTS will forgo forwarding that devices traffic.
2.1.9
CM-Only DHCP Relay is a new feature added to the Bootp-Relay-Control command. This function sets up the CMTS to convert the broadcast DHCP request from a cable modem to a uni-cast message and direct it to the provisioning service identified in the bootp-list command. Customer Premise Equipments (CPE) DHCP discover packet will be forwarded unmodified to the Ethernet network as the original broadcast message sent.
Page 3 of 22
Page 4 of 22
Resolved Description Mode B zero length the PDU of queued packets Intelligent Ingress Avoidance does not work correctly
Page 5 of 22
Tracking No.
3.2.2
Description Impact
Tracking No.
Probability of Occurrence Work Around Affected loads Status Field Bulletin No.
Page 6 of 22
3.2.3
Description
Tracking No.
Impact Probability of Occurrence Work Around Affected loads Status Field Bulletin No.
3.2.4
Description Impact
Tracking No.
Probability of Occurrence Work Around Affected loads Status Field Bulletin No.
3.2.5
Impact Probability of Occurrence Work Around Affected loads Status Field Bulletin No.
Page 7 of 22
3.2.6
Description
Tracking No.
3.2.7
768
Page 8 of 22
3.2.8
CLI limitation where it is unable to enter the max string length (255) for the taglist.
1-NDA5 The maximum size that the taglist is 255 characters. This problem is related to the limitation of the CLI where the maximum string that can be entered is approximately 90 characters. Non-Service Affecting Low The workaround to the CLI string length of 255 chars for the taglist, can be entered from an SNMP manager. 4.2.4 Open
Impact Probability of Occurrence Work Around Affected loads Status Field Bulletin No.
3.2.9
Impact Probability of Occurrence Work Around Affected loads Status Field Bulletin No.
Page 9 of 22
Page 10 of 22
Impact Probability of Occurrence Work Around Affected loads Status Field Bulletin No.
3.2.11 After creating a v3 user and cloning it to AuthPrivMD5/SHA, upon reset the protocols can change.
Tracking No. Description 1-PMRH If a v3 user with Authentication but no Privacy protocol is configured by cloning it to another v3 user with Authentication and Privacy protocols set, upon resetting the CMTS the privacy protocol will revert to the protocol of the cloned user. Non-Service Affecting Low The user will function properly, as if it still had no privacy protocol set, but the display is inaccurate. This can be observed from the CLI and SNMP manager. 4.2.4 Open
Impact Probability of Occurrence Work Around Affected loads Status Field Bulletin No.
Page 11 of 22
3.2.12 When creating SNMPv3 users you have to change the V3 passwords before the accounts can be turned on.
Tracking No. Description Impact Probability of Occurrence Work Around Affected loads Status Field Bulletin No. 1-PN01 When creating SNMPv3 accounts, you have to change the v3 passwords before the accounts can be turned on. Non-Service Affecting: SNMPv3 not active until passwords set. Low Set the v3 password before activating the account. 4.2.4 Open
3.2.13 After setting a SNMPv3 user to no auth and no priv protocols, the auth protocol can not be set or cloned
Tracking No. Description 1-PMRN After setting a v3 user (which previously had been cloned to use auth and priv protocols) to no auth and no priv protocols, the auth and priv protocols cannot be set or cloned. Non-Service Affecting: SNMPv3 user will not have auth or priv is cloned. Low The user account must be deleted and reconfigured. 4.2.4 Open
Impact Probability of Occurrence Work Around Affected loads Status Field Bulletin No.
Page 12 of 22
Impact Probability of Occurrence Work Around Affected loads Status Field Bulletin No.
Impact Probability of Occurrence Work Around Affected loads Status Field Bulletin No.
Page 13 of 22
Page 14 of 22
Page 15 of 22
QoS Parameter Set A set of service flow encodings that describe the Quality of Service attributes of a service flow. QoS RtPS SA Quality of Service Real-Time Polling Service Spectrum Analyzer (enhanced function of eighth upstream receiver in CMTS 1500)
Service Class A set of queuing and scheduling attributes that is named and configured at the CMTS. A service class is identified by a service class name and has a set of zero or more QoS traffic attributes. Service Flow A MAC-layer transport service which (1) provides unidirectional transport of packets from the upper layer service entity to the RF; (2) shapes, policies, and prioritizes traffic according to QoS traffic parameters defined for the flow.
Page 16 of 22
Service Flow Description A service class name that describes a service flows QoS parameters indirectly or a QoS parameter set that describes them directly. Service Identifier (SID) A service flow identifier assigned by the CMTS to an active or admitted upstream service flow (14 bits). SFID SSH UCC UGS/AD Service Flow Identifier-An identifier assigned to a service flow by the CMTS (32 bits). Secure Shell (protocol) Upstream Channel Change Unsolicited Grant with Activity Detection
Page 17 of 22