Академический Документы
Профессиональный Документы
Культура Документы
info@casa-systems.com
www.casa-systems.com
CASA CMTS
Copyright 2011 Casa Systems, Inc. All rights reserved. Licensed software products are
owned by Casa Systems or its suppliers and are protected by United States copyright laws and
international treaty provisions.
The information regarding the product in this guide is subject to change without notice. All
statements, information, and recommendations in this guide are believed to be accurate but are
presented without warranty of any kind, express of implied. Users must take full responsibility for
their application of the product.
In no event shall Casa or its suppliers be liable for any indirect, special, consequential, or
incidental damages, including, without limitation, lost profits or loss or damage to data arising out
of the use or inability to use this guide, even if Casa or its suppliers have been advised of the
possibility of such damages.
Table of Contents
VERSION: NOVEMBER 15, 2011 ........................................................................................................................ 1
(FOR CASA SOFTWARE RELEASES 5.2, 5.4.19, 5.4.21, 6.0.3, AND 6.1.1) ............................................................... 1
PREFACE.............................................................................................................................................. 27
Displaying the cable DSG tunnel configuration (Release 5.4) ............................................................. 420
Associating a downstream channel with a DSG tunnel-group ........................................................... 420
Displaying the downstream DSG configuration (Release 5.4) ............................................................ 421
Displaying DSG channel and tunnel group information...................................................................... 421
Setting a DSG timer to a downstream channel................................................................................... 422
Assigning a DSG vendor-parameter ID to a downstream channel ..................................................... 422
Assigning a DSG channel-list to a downstream channel ..................................................................... 423
Assigning DSG DCD ENABLE to a downstream channel ...................................................................... 423
Setting a DSG time interval on a downstream channel ...................................................................... 424
Displaying the DSG downstream-table settings ................................................................................. 424
Configuring a DSG client list ............................................................................................................... 425
Displaying DSG client lists ................................................................................................................... 426
Configuring DSG vendor parameters .................................................................................................. 426
Displaying DSG vendor parameters .................................................................................................... 427
Configuring a DSG channel list ........................................................................................................... 427
Displaying a DSG channel list.............................................................................................................. 428
Configuring DSG timers ...................................................................................................................... 428
Displaying DSG timers......................................................................................................................... 429
Configuring DSG unicast ..................................................................................................................... 429
Displaying DSG statistics..................................................................................................................... 429
Displaying the DSG running configuration ......................................................................................... 429
Using the DSG feature ........................................................................................................................ 430
Verify DSG DCD message and DSG data forwarding .......................................................................... 432
CONFIGURING DOCSIS BPI/BPI+ ................................................................................................................. 432
Configuring shared secrets to protect the modem configuration file ................................................. 433
Adding the privacy certificate (DOCSIS 3.0 only) ................................................................................ 435
Displaying the privacy certificate configuration (DOCSIS 3.0 only) .................................................... 436
Enforcing BPI and BPI+ ....................................................................................................................... 436
Setting the privacy hotlist (DOCSIS 3.0 only) ...................................................................................... 437
Configuring an encryption algorithm.................................................................................................. 438
Managing revocation certificates ....................................................................................................... 439
Configuring the source address verification rule ................................................................................ 441
Enabling SAV authorization ................................................................................................................ 442
Displaying the SAV configuration ....................................................................................................... 442
Enabling configuration file learning ................................................................................................... 443
Preface
For the descriptions of the hardware features and installation of different platforms, please refer to
the documents:
For the debugging and diagnostic information, refer to the Casa Systems CMTS Debugging and
Diagnostic Reference Guide.
Audience
This guide is intended for system administrators, support engineers, and operators who configure
and manage Casa CMTS products. Users who perform these tasks should be familiar with the
Casa CMTS hardware and cabling, and also have experience with the following:
MPEG-2 protocol
UDP/IP protocol
RF cable plants
DOCSIS protocol
Revision information
Version Additions/Changes
V 5.0.7 / Feb 2008 Same as release C3200.5.0.7
V6.0.1 / July 2008 - DSG configuration section
- SCDMA modulation profile
V6.0.2 / Aug 2008 - Multicast configuration section
V6.0.3 / Aug 2008 - Bonding group configuration
- Monitor line card
- Monitor gige
- IGMP configuration
- Multicast on mac-domain interface
- ARP management
V6.0.4 / Aug 2008 - Trunk-interface configuration section
- Show cable modem remote query
- DOCSIS 3.0 functions in BPI/BPI+ section
Sept 09 2008 - Remove preamble-offset field from modulation profile
Oct 16 2008 - Add more commands to Load Balancing section
Rel5.2.1 / Nov 14 2008 - Access-class configuration
- L2VPN configuration
- TACACS (AAA) configuration
- Loopback interface configuration
- Ingress noise cancellation configuration
- Debug functionality configuration
- DSG command update
- PacketCable 1.5
- Subscriber management
Rel5.2.1/Dec 16 2008 - IPDR configuration
- IPsec configuration
- SNMP command update
- grammar/wording revision
Rel5.2.1/Dec 19 2008 - Remove BPI commands of privacy kek/tek grace-time
- IPDR configuration
- IPsec configuration
- Update SNMP configuration
- More TACACS+ commands
Rel5.2.1/Jan 8 2009 - Upstream channel-frequency range for J-DOCSIS
- Update on some ACL commands
Rel5.4/June 29, 2009 - IPsec command update
- PacketCable command update
- Change minimum upstream frequency to 47 MHz
- System reboot commands update
- Add cm-hop commands in spectrum manager section
-Corrections to the Spectrum Management section
-Corrections to PacketCable section
-Major corrections throughout, including updated examples and
commands
Sept. 2009 -Added alias command for privileged mode.
-Added Link Aggregation Control Protocol.
-Added more VLAN commands.
-Added bootstrap router support.
November 14, 2011 Release 6.1.1 availability update. See the Release Notes for
information.
Content
This guide covers the software configuration commands for Casa CMTS products, and is
organized in following chapters:
Chapter Description
1. Casa CMTS Configuration Describes the Casa CMTS series major interfaces and
Overview how to start configuration.
2. Configuring and Managing the Describes how to use CLI (Command Line Interface) to
Casa CMTS from the Command configure, manage, and monitor the system.
Line Interface
For information on diagnostic and debugging commands, refer to the CMTS Debugging and
Diagnostic Reference.
Notation conventions
This manual uses the following conventions for command syntax descriptions and for textual
emphasis:
Convention Description
Boldface font Commands and keywords are in boldface.
Italic font Arguments for which you supply values are in italics.
[] Elements in square brackets are optional.
{x | y | z} Alternative, mutually exclusive, keywords are grouped in
braces and separated by vertical bars.
[x | y | z] Optional alternative keywords are grouped in brackets and
separated by vertical bars.
String A non-quoted set of characters. Do not use quotation marks
around the string or the string will include the quotation marks.
Screen font Terminal sessions and information the system displays are in
screen font.
Boldface screen font Information you must enter is in boldface screen font.
^ The symbol ^ represents the key labeled Controlfor
example, the key combination ^D in a screen display means
hold down the Control key while you press the D key.
<> Nonprinting characters, such as passwords, are in angle
brackets in contexts where italics are not available. Angle
brackets are also used for variables.
!, # An exclamation point (!) or a pound sign (#) at the beginning
of a line of code indicates a comment line.
This chapter describes how to start up and configure the Casa CMTS in basic operation. It
contains the following sections:
0 1 2 3
s GigE SFP
Figure 1-1. C2200 Front Panel
RF interface numbering
C2200 contains 4 line-card slots located at the rear of the chassis (See Figure 1-2). The 4 slots
can install any combination of the two types of DOCSIS modules, DQM module or DCU module.
Slot numbers are 0 through 3 counting from left to right.
Slot 0 1 2 3
Port numbers for DQM module are 0 through 3 counting from left to right (See Figure 1-3).
The double-row ports of the DCU module are numbered 0 to 7 counting from left to right on the
bottom row and then from left to right on the top (See Figure 1-4).
Line-Card Slot 0 3 1 4 2 5
RF interface numbering
The C3200 contains 6 line-card slots located at the rear of the chassis. The 6 slots can accept
any combination of the two types of DOCSIS modules, DQM modules or DCU modules. Slots are
numbered 0 to 2 counting from left to right on the bottom row and then 3 to 5 from left to right on
the top row (See Figure 1-5). Since the C3200 uses the same types of DOCSIS modules (DQM
and DCU) as C2200 platform does, the numbering schemes for the ports of DOCSIS modules are
the same as well. See figures 1-3 and 1-4 above.
SMM Slot 6 and Slot 7; redundant module in either slot; one will be active and one will be
in standby mode. Both SMMs are fully operational during system operation with SMM
redundancy enabled.
The 10/100 Fast Ethernet ports (eth0) must have unique IP addresses between the
SMMs in slots 6 and 7. However, these addresses can be on the same IP subnet.
To ensure proper cabling to support redundancy, be certain that the GigE ports on the active
SMM have corresponding standby cabling to the redundant SMM (using ports of matching speed)
to connect to your network switches and routers.
Note: If the C10G is rebooted, all modules are reset and the redundant modules automatically
assume Standby status as soon as the CMTS is fully operational.
LC switch (rear slots 5 and 8) -- Operates with DOCSIS line-card module (either DQM or
DCU) to provide N+1 redundancy. If a DOCSIS line-card module fails, a redundant DOCSIS
line-card module automatically assumes operation. The LC switch module cuts off the
connection between failed module and its associated RF I/O module and establishes the
traffic connection between the redundant and the RF I/O module.
With the LC switch module, the front-installed line cards in slots 5 and 8 are available for
redundancy operations.
SMM switch (rear slots 6 and 7) Operates with the front-installed SMM modules. If the
active SMM module fails, the redundant SMM automatically assumes L3 routing operations.
The SMM switch module cuts off the routing operations between the failed SMM to the
upstream and downstream line-card modules and RF I/Os, and then transfers routing
operations to the currently active SMM.
These modules connect to the switching backplane and can be installed during system operation.
There is no need to power down the CMTS for installation or removal.
Caution: The LC and SMM switch modules MUST be installed in their specific chassis slots, and
ALL four slots (5, 6, 7 and 8) must be occupied for redundancy operations. Both modules are
appropriately labeled for identification; either LC SWITCH or SMM SWITCH.
In most cases, you should never have to remove the SMM Switch module in rear slots 6 and 7, or
the LC Switch module in slots 5 and 8. However, in the event that removal is necessary, ensure
that the associated front slots 5 and 8 are not in a redundant state (ACTIVE LED is off).
If the SMM Switch and LC Switch modules are removed at any time, future redundancy
operations will not be available.
See the Casa Systems C10G CMTS Hardware Installation Guide for information on installing
and removing these modules.
By default, the CMTS software protects all modules by making them available for switching to a
redundant standby.
Example:
To enable redundancy protection on selected CMTS modules, enter configuration mode and use
the following command:
CASA-CMTS# config
CASA-CMTS(config)# ha redundancy [module list]
Specify the modules by slot number, separating each module in the list with a comma (). Valid
values are 0 to 13.
In the above example, the modules in system slots 3, 4, 9, 10, and 13 are not redundancy
protected.
Example:
To enable redundancy protection on ALL CMTS modules in slots 0 to 13, enter the following
command:
CASA-CMTS(config)# ha redundancy
Example:
Specify a module by slot number. Valid values are 0 to 13. Repeat the command to remove
additional modules from the previously-configured module list.
CASA-CMTS(config)# no ha redundancy 2
In the above example, the module in system slot 2 is removed from the list of redundancy-
protected modules.
Example:
To revert back to the primary module after 30 minutes (default), enter the following command:
Example:
To revert back to the primary module after 2 hours (120 minutes), enter the following command:
Example:
To disable reverting to the primary modules after recovery to the standby state, enter the
following command:
Placing a module in the standby state allows you to pull and replace the module in the chassis (if
necessary) without service interruption.
Example:
To switch from the active primary line card to the standby module immediately, enter the following
command:
where <module> is the primary line card that will switch over to the standby. The CMTS software
will look for the standby card, examine its current status, and will either permit or deny the failover
(if the standby is not ready, has an unknown status, or is not found).
To revert back from the redundant standby (currently active in slots 5 or 8) to the primary line
card (slots 0 to 4, 9 to 13), enter the following command:
where <module> is the primary line card to which the standby module will switch back.
Note: The ha module <module> revert command is not supported for SMM operations in
slots 6 and 7.
show ha configuration
show ha log
clear ha log
Example:
Use the show ha log command to display high-availability event history, including the time of the
failover, type of failure, and the affected system slots. Executing the clear ha log will erase the
current high-availability logged entries.
Note: If ha redundancy is set for a specific set of modules, the show running-config
command will display those modules with the entry ha redundancy <module-list>.
Similarly, if redundancy is disabled for all modules, then entry no ha redundancy will
display.
Example:
To disable the software auto-recovery to revert to the default setting, use the no form of the
command.
Example:
CASA-C10G# show envm
Note that the C10G uses three fan modules: LEFT, CENTER and RIGHT. Each module has two
fans that are designated as either front or back, as follows:
at 6MHz), channels 0, 2 and 3 will be correctly separated by 6MHz based on the specified
channel 1 frequency setting. The same applies to channels 4 to 7.
In the following example, the two 4-channel banks are contiguous across the port with 6MHz
separation.
In the following example, the two 4-channel banks are non-contiguous across the
port with the range 50MHz to 68Mhz for channels 0 to 3, and 573MHz to 591MHz for
channels 4 to 7. Each 4-channel bank still maintains 6MHz frequency separation.
interface qam 12/0
interleave 8
channel 0 frequency 50000000
no channel 0 shutdown
channel 1 frequency 56000000
channel 1 shutdown
channel 2 frequency 62000000
channel 2 shutdown
channel 3 frequency 68000000
channel 3 shutdown
channel 4 frequency 573000000
channel 4 shutdown
channel 5 frequency 579000000
channel 5 shutdown
channel 6 frequency 585000000
channel 6 shutdown
channel 7 frequency 591000000
channel 7 shutdown
no shutdown
Completing pre-configuration
This section describes prerequisite steps you must complete prior to powering on and configuring
your Casa CMTS.
Step Action
1 Ensure that your network supports reliable broadband data transmission.
2 Ensure that your Casa CMTS is installed according to the instruction in the Casa
CMTS Hardware Installation Guide. This includes connecting a CMTS GigE Ethernet
port to a GigE port on the network.
3 Ensure that all other required headend routing and network interface equipment is
installed, configured, and operational. This includes:
After these prerequisites are met, you are ready to configure your Casa CMTS.
For complete commands and syntax, refer to Chapter 2 of this document Configuring and
Managing Casa CMTS from the Command Line.
Note: Use the console cable provided by Casa to ensure the connection will work. See the
appropriate hardware installation guide for the console pinouts.
default parameters.
Example:
CASA-CMTS# reset-console
Example:
CASA-CMTS(config)#end
CASA-CMTS#
Use the show running-config command to display the password string. Use the
logout command to end any password-protected console session.
Example:
CASA-CMTS(config# console-password 2b/~2b
To save the current running-configuration settings to a storage location for the startup-
configuration settings:
If you attempt a copy run start when a module is not in the running state, the following message
is displayed, followed by the prompt:
One or more modules are not in running state. You might lose part of
your startup-config if you save now. You can wait or use 'copy run
start unconditional' to save your config anyway.
You can wait for the module to boot up or you can force the reboot by retyping the command and
adding the unconditional argument.
To store the configuration or changes to your startup configuration in NVRAM, perform the
following:
Refer to the Managing Configurations section of this guide for additional information on saving,
copying, and restoring CMTS configurations.
Casa CMTS Software Configuration Guide 49
CASA CMTS
Example:
CASA-CMTS(conf-if-eth 0)#ip address 135.2.2.2
255.255.252.0
Basic configuration
The following sample configuration provides basic settings for registering CMs.
hostname CASA-CMTS
interface eth 0
ip address 192.168.2.215 255.255.255.0
interface gige 0
ip address 192.168.3.106 255.255.255.0
ip igmp
no shutdown
channel-utilization-interval 10
interface ip-bundle 1
ip address 192.168.7.1 255.255.255.0
cable helper-address 192.168.3.7
interface docsis-mac 1
no shutdown
ip bundle 1
downstream 1 interface qam 0/0/0
upstream 1 interface upstream 1/0/0
General configuration
The following sample configuration includes spectrum management, channel bonding, and load-
balancing configuration.
hostname CASA-CMTS
interface eth 0
ip address 192.168.2.215 255.255.255.0
spectrum rule 35
action modulation frequency channel-width
channel-width 3200000 1600000
no channel 1 shutdown
no channel 2 shutdown
no channel 3 shutdown
power 580
interface gige 0
ip address 192.168.3.106 255.255.255.0
ip igmp
no shutdown
interface ip-bundle 1
ip address 192.168.6.1 255.255.255.0
ip address 122.8.74.1 255.255.254.0 secondary
cable helper-address 192.168.3.7
service group 1
qam 0/0/0
qam 0/0/1
qam 0/0/2
qam 0/0/3
qam 0/1/0
qam 0/1/1
qam 0/1/2
qam 0/1/3
upstream 1/0/0
upstream 1/1/0
upstream 1/2/0
upstream 1/3/0
upstream 1/4/0
upstream 1/5/0
Casa CMTS Software Configuration Guide 53
CASA CMTS
upstream 1/6/0
upstream 1/7/0
interface docsis-mac 1
no shutdown
ip bundle 1
downstream 1 interface qam 0/0/0
downstream 2 interface qam 0/0/1
downstream 3 interface qam 0/0/2
downstream 4 interface qam 0/0/3
downstream 5 interface qam 0/1/0
downstream 6 interface qam 0/1/1
downstream 7 interface qam 0/1/2
downstream 8 interface qam 0/1/3
upstream 1 interface upstream 1/0/0
upstream 2 interface upstream 1/1/0
upstream 3 interface upstream 1/2/0
upstream 4 interface upstream 1/3/0
upstream 5 interface upstream 1/4/0
upstream 6 interface upstream 1/5/0
upstream 7 interface upstream 1/6/0
upstream 8 interface upstream 1/7/0
channel-utilization-interval 10
The CASA CMTS system is managed and configured through Casas CLI (Command Line
Interface). The initial configuration of the Casa CMTS is done from a console port. After an IP
address has been assigned to the management port, users can telnet to the system to perform
remote management and configuration.
Configuration:
Managing configurations
Managing NVRAM files
Updating system software
Management ports (Fast Ethernet)
GigE Ethernet, loopback, and trunk interfaces
LACP
PIM-SM
OSPF, RIP, and BGP
Virtual private networks (VPNs and L2VPNs)
TACACS+ and RADIUS AAA
Streams
Downstream QAM ports and upstream port interfaces
Logical upstream channels
MAC domains
IP bundles
Service and bonding groups
Modulation profiles
Multicast operations
Cable service classes
PacketCable
DSG tunnels and tunnel groups
DOCSIS BPI/BPI+
Source Address Verification
Leasequery
Spectrum Management
Load balancing
Channel bonding
Quality of Service (QoS)
SNMP
IPDR
IPsec
Cable modems
Subscriber management
Configuring MPEG-compliant features
Configuring DVB-compliant Features
Time zone settings
IP access lists
Configuring DOCSIS event notification policy
Logging commands
In Private mode, the user has limited access to the system resources, and cannot configure the
system. The default mode is private.
In Privileged mode, you can enter configuration mode and other modes to perform various
configuration tasks. Privileged mode is password-protected.
Example:
CASA-CMTS> enable
3 Password: casa Enter privileged mode. Enter the
password at the system prompt.
Example: The default password is casa.
CASA-CMTS> enable Once the password is accepted,
Password: casa the prompt changes to # prefix.
CASA-CMTS#
Example:
CASA-CMTS# exit
Where:
<new_password> New password for entering
privileged mode.
Example:
CASA-CMTS# password mypassword
Where:
<new_password> New password for entering
privileged mode.
Example:
CASA-CMTS# reset password mypassword
Encrypting passwords
The service password-encryption command enables encryption of MD5 and other passwords,
such as BGP neighbor passwords, RIP, OSPF, and IS-IS protocol authentication passwords on
GigE interfaces. By default, passwords are not encrypted in the CMTS running configuration.
Use the show running-config command to verify the current password encryption setting.
Example:
CASA-CMTS# hostname host_200
host_200#
Example:
CASA-CMTS# alias au adduser
CASA-CMTS#
CASA-CMTS# no alias au
CASA-CMTS#
Example:
CASA-CMTS# show aliases sh
alias sh show
Note: This command operates at the top level of the CLI and
in configuration mode.
To save the current running-configuration settings to a storage location for the startup-
configuration settings:
If you attempt a copy run start when a module is not in the running state, the following message
is displayed, followed by the prompt:
One or more modules are not in running state. You might lose part of
your startup-config if you save now. You can wait or use 'copy run
start unconditional' to save your config anyway.
You can wait for the module to boot up or you can force the reboot by retyping the command and
adding the unconditional argument.
Example:
Example:
Where:
<userID> Specifies the FTP user login ID.
<host-ipaddress> Specifies the IP address of the FTP
location.
<source-file> Specifies the name of the file at the
CMTS to be copied over FTP to a
destination. Destinations include C10G
flash disk 2 (fdsk2), SMM module slot 6
or 7, or non-volatile RAM (NVRAM).
module Specifies the destination C10G SMM
<smm_slot> slot number, either 6 or 7, followed by
the target location, either fdsk2 or
nvram.
Examples:
Where:
<host-ipaddress> Specifies the IP address of the FTP
location.
<source-file> Specifies the name of the file at the
CMTS to be copied over FTP to a
destination. Destinations include C10G
flash disk 2 (fdsk2), SMM module slot 6
or 7, or non-volatile RAM (NVRAM).
module Specifies the destination C10G SMM
<smm_slot> slot number, either 6 or 7, followed by
the target location, either fdsk2 or
nvram.
<dest-filename> Specifies the optional TFTP directory
path location and filename.
Examples:
Where:
<userID> Specifies the FTP user login ID.
<host-ipaddress Specifies the IP address of the FTP
target location.
<source-file> Specifies the name of the file at the
CMTS fdsk2 drive to be copied to a
remote target.
<dest-filename> Specifies the filename or full directory
path location and filename to which
the file is sent.
<remote_directory> Specifies the target directory to which
the current file is sent.
Examples:
CASA-C10G(config-if-gige 6/1)#
Where:
<source-file- name> Specifies the file name in NVRAM to
be copied.
<host-ip> Specifies the IP address of the target
host.
<target-file-name> Species the file name at the host
target.
Example:
Copy startup-config from NVRAM to host 192.168.2.39 as startup-
config-Casa CMTS:
User management and security control is possible only by super users in enabled mode. The
privilege level of a user determines the access rights of the user to view, monitor, change, and
maintain the configuration of the switch. A super user may perform all possible functions.
The capabilities of a given privilege level is predetermined in the system. The following table
illustrates the capabilities of all privilege levels. The operator can only view information on the
CMTS; this level cannot make changes, reboot the system, or enter diagnostic mode.
The maintenance level can update system information to manage the existing configuration, but
not change configuration information. Maintenance can do firmware upgrade, clock setting,
management and GigE Interface management, and reboot. The video level can manage the
stream and downstream module configurations (edge-QAM management).
The CMTS level can modify the configuration information. Video2 and CMTS2 combine the
configuration privileges with the maintenance privileges. The DCTS level is for DCTS commands
only.
The system administrator can access all commands except diagnostic mode.
While user management allows valid users to gain access to the system and maintain the status
of the users, security control governs the specific actions performed by the users.
The user root is a special super user and cannot be deleted. The system will always have the
user root and the password of this user may be changed by a super user. Only a super user can
perform all user management. An exception to this is resetting the password of user root to a
default password. This operation is permitted only from the console of the switch and maybe
executed by any user. See the section Resetting Privileged Password to Default.
Example:
CASA-CMTS# show ssh hostkey fingerprint rsa
2048
fe:61:45:6b:48:3f:9e:19:f3:ce:5d:c8:f6:26:9f:a2
3 show ssh hostkey {dsa | rsa | fingerprint} Displays hot key
information.
Where:
dsa DSA key.
rsa RSA key.
fingerprint CMTS ssh server public host key fingerprint.
Example:
CASA-CMTS# show ssh hostkey dsa
NXF2Griv5mPFvuwA2hnHOVJBucrYLfDZL3+YgKBkov65FyYtssm
AAAAIEAzhzwHRxVsU+v
wgWdTxLnDQEi6//U82ywJdQjVAK6q+daIarwj5I1YIzNFks/cLR
j0ZaBSkBtxoqrjNKdXM
nQFre0rbbAknFWk2fnt9mrisFKAe/T9O7Y72lqcd5reB54/Uioz
E1+WA5+K7oRcdaNKF8V
ph7p/2xn7ZeUxQ35ip0=
---- END SSH2 PUBLIC KEY ----
Example:
CASA-CMTS# ssh start [port <2000-65535>]
5 ssh stop Disable the SSH
server.
Example:
CASA-CMTS# ssh stop
SSH server stopped.
6 ssh gen-hostkey {dsa | rsa} Replace the
default keys.
Where:
dsa DSA key.
rsa RSA key.
Example:
CASA-CMTS# ssh gen-hostkey {dsa | rsa}
Note: The SSH implementation on the Casa CMTS does not support public key authentication.
Where:
<user-name> Telnet user-name string.
<password> User password associated with the user
name.
[privilege <level>] Optional. If the privilege is not specified, a
default lowest privilege level of 1 is
assumed. The level is a number in the range
1 to 15.
Example:
Add operator as user-name with privilege level 9 and private as
password to Telnet login list:
Where:
<user-name> Telnet user name string.
<password> Password associated with the user
name.
Example:
CASA-CMTS# user password operator
Enter new password: public
Re-enter new password: public
CASA-CMTS#
Note: All user passwords can be changed including the root password.
Example:
CASA-CMTS# deluser operator
CASA-CMTS#
Note: The default user-name root cannot be removed from the configuration.
Example:
CASA-CMTS# show user current
USER TTY TYPE FROM SINCE
----------------------------------------------------------------------
root pts/1 telnet 192.168.2.38 Mon Aug 2 21:28:50 2010
CASA-CMTS# config
CASA-CMTS(config)# no telnet timeout
There are several options available to reboot the system. The system may be rebooted right
away without any delay or may be scheduled for a reboot at a later time. All the reboot events are
saved in the system log-file and a reboot message will be broadcast to all CLI shell sessions.
Where:
<reason-text> Optional text to be displayed before system reboots. If
the text contains any embedded space, then the entire
text should be within quotes.
mmm | Reboot the system after a delay specified either by
hhh:mm minutes or hours and minutes.
Specify minutes in the range 0 to 999, a 0 implies
reboot immediately.
Specify hours and minutes in the range 0-168 and 0-
59 respectively.
remind Display reminder message before a scheduled reboot
<num=1:60> (specify the time in minutes to send the reminder).
<day month> Schedule a reboot on a particular day. day is the day
of the month (1-31) and month is the name of the
month (January, February, etc.). When specifying the
month, enter the full name or a partial name as long
Examples:
CASA-CMTS# system reboot reason Use new release
5.4.19.9
When a user logs into the system and if a reboot has been scheduled, a message containing the
reboot schedule will be displayed. When a scheduled reboot is cancelled, a cancel message will
be broadcast to all the CLI shell sessions and the event will be recorded in the system log-file.
When executing the system reboot command, respond to the Save [yes/no]? prompt by typing
yes in lowercase characters to save the configuration, or type no to proceed without saving the
configuration. At the Proceed with reload? prompt, type confirm or press [Enter] to proceed with
the system reboot. To cancel the system reboot, type no at the Proceed with reload? prompt.
Caution: Pressing any key in response to the System configuration has been modified. Save?
prompt will NOT save the configuration prior to confirming the system reboot.
Where:
<clock> System clock in the format:
MMDDhhmmYYYY
MM month, DD -- day, hh hour, mm
minute, YYYY-- year.
Example:
CASA-CMTS(config)# system clock 071621082004
Fri Jul 16 21:08:00 UTC 2004
2 show clock Display the system
clock.
Example:
CASA-CMTS# show clock
Fri Jul 16 21:08:06 UTC 2004
CASA-CMTS#
Example:
CASA-CMTS(config)# system timezone
America/New_York
2 show timezone [list] Display the
configured
Where: timezone or the
list Optional: Displays the full list of valid time zones. option list of all
time zones.
Example:
To show the current time zone:
CASA-CMTS(config)# show timezone
Examples:
CASA-CMTS(config)# ntp server 192.168.4.200
Example:
CASA-CMTS(config)# system rate limit broadcast
500
Note: When configuring loopback settings, a warning message will be returned to the console if
the loopback interface port is not yet configured with the interface loopback command.
<interface- Specifies the NTP loopback interface Use the no form of the
number> number in the range 0 to 15. command to remove the
current setting.
Example:
CASA-CMTS(config)# ntp source-interface
loopback 4
Example:
CASA-CMTS(config)# route net 193.100.1.0 24 gw
192.168.2.177
CASA-CMTS(config)#
CASA-CMTS(config)# no route net 193.100.1.0 24 gw
192.168.0.177
Where:
Use the no form of the
<host-ip> Destination host IP address in the format command to delete the
a.b.c.d. entry from the host table.
Example:
CASA-CMTS(config)# route host 192.168.10.1 gw
192.168.2.177
Example:
CASA-CMTS(config)# route net
2001.1234.1234.1234::::/64 gw 2001:1234::0
CASA-CMTS(config)#
Example:
CASA-CMTS(config)#show route
Kernel IP routing table
Destination Gateway Genmask Flags Metric
Example:
CASA-CMTS# show alarm
reason: Unspecified
[Wed Oct 28 07:45:09 2009]-AL-CLI-1: User root
Rebooting system
Example:
CASA-CMTS(config)# logging source-interface
loopback <lo_id>
Examples:
CASA-CMTS(config)# lawful-intercept tid stream-id
Bridge failure
Breakdown in a data path within the confines of the available Bridge LAN components
Automatic accommodation of any bridge port added to the Bridge LAN without the formation
of transient data loop.
Example:
CASA-CMTS# show rstp port [<port-id>]
ARPA eth 0
192.168.2.114 00:14:18 000d.5663.d756
dynamic ARPA eth 0
192.168.2.238 00:10:00 0050.c231.c013 static
ARPA eth 0
192.168.3.6 00:10:00 0009.5bbd.b87e dynamic
ARPA Gige 0
192.168.3.131 00:00:00 0050.c231.c03b static
ARPA Gige 0
192.169.4.4 00:18:19 0050.c231.c03f static
ARPA CATV-MAC 1
192.169.4.120 00:00:48 0011.1ac8.326e
dynamic ARPA CATV-MAC 1
192.169.4.121 00:00:51 0016.b560.aef8
dynamic ARPA CATV-MAC 1
Example:
CASA-CMTS(config)# arp request-interval 2000
Note: The CMTS will round the ARP request interval from 1 to
9 seconds to 10 seconds. The default setting is 30 seconds. If
the CMTS does not receive an ARP response from a CM or
CPE in 6 * ARP request interval seconds, the CM or CPE is
ARP timed out, and the CMTS will remove the ARP entry for
the CM or CPE.
1 [no] cable arp filter <number> <seconds> Set the number of ARP
packets to accept within
Example:
CASA-CMTS(config)# cable arp filter 5 2
The clear arp-cache command also supports the asterisk (*) wildcard when selectively clearing
IP addresses from the ARP cache. The software will stop scanning when the first asterisk is
detected in the IP address.
Example:
Example:
CASA-CMTS# show cpuinfo module 0
Module 0:
cpu model SiByte SB1 V0.3 FPU V0.3
BogoMIPS 532.48
microsecond timers yes
tlb_entries 64
11:01pm up 20 min, 0 users, load average:
0.13, 0.07, 0.01
44 processes: 43 sleeping, 1 running, 0
zombie, 0 stopped
CPU states: 2.3% user, 1.4% system, 0.0% nice,
96.3% idle
Mem: 245352K total, 192896K used, 52456K free,
500K buffers
CASA-CMTS#
Module 0:
cpu model SiByte SB1 V0.3 FPU V0.3
BogoMIPS 532.48
microsecond timers yes
tlb_entries 64
5:28pm up 1:24, 0 users, load average: 0.02, 0.04, 0.00
44 processes: 43 sleeping, 1 running, 0 zombie, 0 stopped
CPU states: 2.2% user, 0.9% system, 0.0% nice, 97.0% idle
Mem: 245352K total, 192896K used, 52456K free, 500K buffers
Module 1:
cpu model SiByte SB1 V0.3 FPU V0.3
BogoMIPS 265.42
microsecond timers yes
tlb_entries 64
5:28pm up 1:24, 0 users, load average: 0.21, 0.31, 0.28
Example:
CASA-CMTS# show meminfo module 0
Module 0:
MemTotal: 245352 kB
MemFree : 52672 kB
CASA-CMTS#
Disable monitoring:
CASA-CMTS(config)# no monitor keepalive
Example:
CASA-CMTS(config)# monitor gige
Disable monitoring:
CASA-CMTS(config)# no monitor gige
Where:
<ip-address> IP address to ping.
[retries] The number of consecutive pings before
reboot. The default is 30 (60 seconds).
Example:
CASA-CMTS(config)#auto-reboot monitor
192.168.2.177 30
Note: This command is available in 5.4, but it is not persistent and it cannot be saved in the
start-up configuration
Example:
In the following example, 192.168.3.8 is a host on the gige
side and 10.248.1.1 is the IP-bundle interface. Consult the
Linux documentation for additional arguments.
Where:
<ip-address> Specifies the destination IP address to which a
route is traced. A network mask is not used.
help Specifies the traceroute command options that
you can provide on the command line.
-d Enables socket level debugging.
-f Sets the "Don't Fragment" bit.
-I Use ICMP ECHO for probes.
-n Do not try to map IP addresses to host names
when displaying them.
-r Bypassed the normal routing tables and sends
directly to a host on an attached network. If the
host is not on a directly-attached network, an error
is returned. This option can be used to ping a
local host through an interface that has no route
through it.
-v Verbose output. Received ICMP packets other
than TIME_EXCEEDED and UNREACHABLEs
are listed.
-x Toggles IP checksums. Normally, this prevents
traceroute from calculating IP checksums. In
some cases, the operating system can overwrite
parts of the outgoing packet but not recalculate
the checksum (so in some cases the default is to
not calculate checksums and using x causes
them to be calculated). Note that checksums are
usually required for the last hop when using ICMP
ECHO probes ( -I ). So they are always calculated
when using ICMP.
-f first_ttl Specifies with what TTL to start. Defaults to 1.
-g gateway Tells traceroute to add an IP source routing option
to the outgoing packet that tells the network to
route the packet through the specified gateway.
Not very useful because most routers have
disabled source routing for security reasons
i iface Specifies the interface through which traceroute
should send packets. By default, the interface is
Example:
nqueries ]
[ -s src_addr ] [ -t tos ] [ -w waittime ] [
-z pausemsecs ] host [ packetlen ]
Example output:
traceroute to verizon.net (206.46.232.39), 30 hops max, 40 byte packets
1 192.168.2.1 (192.168.2.1) 0.564 ms 0.438 ms 0.402 ms
2 192.168.1.1 (192.168.1.1) 1.724 ms 1.482 ms 1.334 ms
3 192.168.0.1 (192.168.0.1) 3.573 ms 3.308 ms 3.400 ms
4 209.101.35.209 (209.101.35.209) 4.334 ms * 4.179 ms
5 208-41-205-1.client.dsl.net (208.41.205.1) 20.577 ms 16.912 ms 19.954 ms
6 ge-2-2-0.c00.nyc.megapath.net (155.229.123.121) 19.863 ms 17.526 ms
19.568 ms
7 ge-6-5.car1.NewYork1.Level3.net (209.246.126.1) 19.946 ms 17.224 ms
19.897 ms
8 vlan69.csw1.NewYork1.Level3.net (4.68.16.62) 19.893 ms 17.967 ms 19.767
ms
9 ae-64-64.ebr4.NewYork1.Level3.net (4.69.134.113) 24.904 ms 22.647 ms *
10 ae-6-6.ebr2.NewYork2.Level3.net (4.69.141.22) 19.224 ms 17.346 ms 19.626
ms
11 ae-2-52.edge2.NewYork2.Level3.net (4.69.138.227) 23.098 ms 17.541 ms ae-
1-51.edge2.NewYork2.Level3.net (4.69.138.195) 25.399 ms
12 0.ge-2-0-0.BR3.NYC4.ALTER.NET (204.255.173.53) 17.668 ms mci-level3-
xe.newyork2.Level3.net (4.68.110.234) 17.970 ms mci-level3-
xe.newyork2.Level3.net (4.68.110.106) 57.640 ms
13 0.xe-0-1-3.XL3.NYC4.ALTER.NET (152.63.17.58) 18.088 ms 0.xe-5-0-
3.XL3.NYC4.ALTER.NET (152.63.18.6) 17.976 ms 0.xe-5-1-3.XL3.NYC4.ALTER.NET
(152.63.16.182) 19.120 ms
14 0.ge-7-2-0.XL3.DFW7.ALTER.NET (152.63.0.34) 102.254 ms 101.897 ms
104.069 ms
15 POS7-0.GW2.DFW13.ALTER.NET (152.63.103.229) 103.922 ms POS6-
0.GW2.DFW13.ALTER.NET (152.63.103.225) 102.292 ms 101.520 ms
16 verizon-gw.customer.alter.net (63.65.122.26) 104.015 ms 102.131 ms
103.928 ms
17 po121.ctn-core1.vzlink.com (206.46.225.18) 114.777 ms 101.656 ms 103.760
ms
18 206.46.228.130 (206.46.228.130) 104.236 ms 101.775 ms 104.338 ms
19 206.46.232.34 (206.46.232.34) 103.508 ms 102.530 ms 103.747 ms
1 [no] cable icmp filter <number> <seconds> Set the number of ICMP
packets to accept within
Where: the specified time
<number> A value in the range 0 to 255 to specify the window.
maximum number of ICMP response
packets to accept from the CM or CPE within Use the no form of the
the specified time window. The default command to revert to the
setting is 0 ICMP packets, or no filtering. default settings.
Example:
CASA-CMTS(config)# cable icmp filter 100 2
1 [no] cable dhcp filter <number> <seconds> Set the number of DHCP
packets to accept within
Where: the specified time
<number> A value in the range 0 to 255 to specify the window.
maximum number of ICMP response
packets to accept from the CM or CPE within Use the no form of the
the specified time window. The default command to revert to the
setting is 0 DHCP packets, or no filtering. default settings.
Example:
CASA-CMTS(config)# cable dhcp filter 100 2
Example:
CMTS(config)# channel-utilization-interval 100
-------------------------------------------------------------------------------
2/0.0 (18000000 Hz) up 0 1 4 Certification
2/0.1 (20000000 Hz) down 0 0 0
2/1.0 (25000000 Hz) up 0 8 3
2/1.1 (20000000 Hz) down 0 0 0
2/2.0 (32000000 Hz) up 2 7 4
2/2.1 (20000000 Hz) down 0 0 0
2/3.0 (11000000 Hz) up 0 4 3
2/3.1 (20000000 Hz) down 0 0 0
2/4.0 (16000000 Hz) up 0 0 0
2/4.1 (20000000 Hz) down 0 0 0
2/5.0 (20000000 Hz) up 0 0 0
2/5.1 (20000000 Hz) down 0 0 0
2/6.0 ( 8000000 Hz) down 0 0 0 docsis
2/6.1 (20000000 Hz) down 0 0 0
2/7.0 (32000000 Hz) down 0 0 0
2/7.1 (20000000 Hz) down 0 0 0
4/0.0 (32600000 Hz) up 0 0 0
4/0.1 (34200000 Hz) up 0 0 0
4/1.0 (35800000 Hz) up 0 0 0
4/1.1 (37400000 Hz) up 0 0 0
Example:
CASA-CMTS(config)#system monitor cpu enable
In addition, the CPU and memory usage thresholds can be defined in each module. To configure
the CPU monitor:
The fast Ethernet interface has a default IP address and subnet mask: 192.168.2.100
255.255.255.0. The commands are:
Example:
CASA-CMTS(config)# interface eth 0
Example:
Set the IP address of Fast Ethernet port to 192.168.2.211 and
subnet mask to 255.255.255.0:
Example:
CASA-CMTS(config-if-eth 0)# end
Obtaining the IP address of the Fast Ethernet port from the DHCP
server
Instead of specifying an IP address to the Fast Ethernet port, the IP address can also be
assigned by the DHCP server.
Example:
CASA-CMTS(config)# interface eth 0
Example:
CASA-CMTS(config)# interface eth 0
2 ip access-group <string> Configure an IP Access
Group on eth0 or delete
Where: the group.
<string> The access group name.
Example:
Configure my_access_group on eth0:
CASA-CMTS(config-if-eth0)# ip access-group
my_access_group
Where:
<port> Gigabit Ethernet port number in the
range 0 to 11 for C3200/C10200 , 0 to
3 for C2200, 0 to 7 on the C10G
<slot> System slot number on C10G; either 6
or 7
Example:
CASA-CMTS(config)# interface gige 1
CASA-CMTS(config-if-gige 1)#
2 no shutdown Enable the GigE port
Example:
CASA-CMTS(config-if-gige 1)# no shutdown
CASA-CMTS(config-if-gige 1)# end
The auto-negotiation mode needs to be disabled when the other side of Gigabit Ethernet
connection does not support auto negotiation or is in simplex mode. The disable mode only
applies to optical connections.
Note that the Gigabit port does not negotiate the data rate; it must be connected to another
Gigabit interface.
Example:
CASA-CMTS(config)# interface gige 1
Casa CMTS Software Configuration Guide 109
CASA CMTS
CASA-CMTS(config-if-gige 1)#
2 [no] auto negotiate Enable or disable auto-
negotiation mode.
Where:
<port> Gigabit Ethernet port number in the range 0 to
11.
Example:
CASA-CMTS(config-if-gige 1)# auto negotiate
Disable mode:
CASA-CMTS(config-if-gige 1)# no auto negotiate
Example:
CASA-CMTS(config)# interface gige 1
CASA-CMTS(config-if-gige 1)#
2 [no] ip address <ip-address> <subnet-mask> Assign an IP address to
a GigE port.
Where:
<ip-address> Text string for standard IP address in
the format a.b.c.d.
<subnet-mask> Text string for standard subnet mask
in the format p.q.r.s
Example:
Assign IP address 192.168.3.100 to Gigabit Ethernet port 1:
CASA-CMTS(config-if-gige)# ip address
192.168.3.100 255.255.255.0
CASA-CMTS(config-if-gige)#
Example:
CASA-CMTS(config)# interface gige 1
CASA-CMTS(config-if-gige 1)#
2 ip access-group <string> Assign an IP access
group to a GigE port.
Where:
<string> The access group name.
Example:
CASA-CMTS(config)# interface gige 1
CASA-CMTS(config-if-gige 1)# ip access-group
my_access_group
Example:
CASA-CMTS(config)# interface gige 1
CASA-CMTS(config-if-gige 1)#
2 [no] ipv6 address <ipv6-address>/<mask_len> Assign an IPv6
address to a
Where: Gigabit Ethernet
port.
Casa CMTS Software Configuration Guide 111
CASA CMTS
Example:
Assign IPv6 address 2000::1000:1/64 to Gigabit Ethernet port 1:
CASA-CMTS(config-if-gige 1)# ipv6 address
2000::1000:1/64
Example:
CASA-CMTS(config)# interface gige 1
CASA-CMTS(config-if-gige 1)#
2 [no] vlan <vlan-id> Assign a GigE port to a
VLAN or remove the
Where: assignment.
<port> GigE port number in the range 0 to 11.
<vlan-id> VLAN ID. Valid values are 256 to 4,096
(Release 5.2).
VLAN ID. Valid values are 2 to 3,700
(Release 5.4).
Example:
Assign Gigabit Ethernet port 1 to VLAN 256:
CASA-CMTS(config-if-gige 1)# vlan 256
Example:
CASA-CMTS(config)# interface gige 1
CASA-CMTS(config-if-gige 1)#
2 [no] ip igmp Enable or disable IGMP
client service.
Example:
Enable IGMP client service on Gigabit Ethernet port 1:
Example:
CASA-CMTS(config)#igmp client version 2
Example:
CASA-CMTS(config)# interface gige 1
CASA-CMTS(config-if-gige 1)#
2 mtu <1500-1800> Configure the MTU size
of a GigE port interface
Where:
<1500-1800> The values are in bytes. Default is 1500
bytes.
Example:
CASA-CMTS(config-if-gige 1)# mtu 1800
Example:
Show all Gigabit Ethernet interfaces:
CASA-CMTS# show interface gige
interface gige 0
ip address 192.168.3.110 255.255.255.0
no ip igmp
.auto negotiate
no shutdown
no ip pim sparse-mode
interface gige 1
no ip igmp
auto negotiate
no shutdown
no ip pim sparse-mode
Casa CMTS Software Configuration Guide 114
CASA CMTS
interface gige 2
no ip igmp
auto negotiate
no shutdown
no ip pim sparse-mode
interface gige 3
no ip igmp
auto negotiate
no shutdown
no ip pim sparse-mode
interface gige 4
no ip igmp
auto negotiate
no shutdown
no ip pim sparse-mode
interface gige 5
no ip igmp
auto negotiate
no shutdown
no ip pim sparse-mode
interface gige 6
no ip igmp
auto negotiate
no shutdown
no ip pim sparse-mode
interface gige 7
no ip igmp
auto negotiate
no shutdown
no ip pim sparse-mode
interface gige 8
no ip igmp
auto negotiate
no shutdown
no ip pim sparse-mode
interface gige 9
no ip igmp
auto negotiate
no shutdown
no ip pim sparse-mode
interface gige 10
no ip igmp
auto negotiate
no shutdown
no ip pim sparse-mode
interface gige 11
Casa CMTS Software Configuration Guide 115
CASA CMTS
no ip igmp
auto negotiate
no shutdown
no ip pim sparse-mode
Example:
Show all 10Gigabit Ethernet interfaces:
1 show interface { gige | xgige} <port> {acl-count [details] | brief | Display the GigE
lacp status | service-policy-count [details] | stat | throughput interface
[duration <seconds>]} statistics.
Where:
Example:
CASA-CMTS# show interface gige 0 stat
IfInTotalPkts 0 packets/second
IfOutOctets 0 bytes/second
IfOutUcastPkts 0 packets/second
IfOutNUcastPkts 0 packets/second
IfOutTotalPkts 0 packets/second
Example:
CASA-CMTS(config)# interface loopback 12
CASA-CMTS(conf-if-lo 12)#
Example:
CASA-CMTS(config)# interface loopback 4
CASA-CMTS(conf-if-lo 4)#
Example:
Assign IPv6 address 2000::1000:1/64 to GigE port 4:
CASA-CMTS(config-if-lo 4)# ipv6 address
2000::1000:1/64
Example:
CASA-CMTS(config)# interface loopback 0
CASA-CMTS(conf-if-lo 0)#
Example:
CASA-CMTS(config)# interface loopback 0
CASA-CMTS(conf-if-lo 0)#ip address 60.1.2.3
255.255.0.0
Example:
CASA-CMTS(config)# interface loopback 0
CASA-CMTS(conf-if-lo 0)#
2 [no] ip access-group <string> Assign an access group
to a loopback interface.
Where:
<string> The access group name.
Example:
CASA-CMTS(config-if-lo 0)#ip access-group
my_access_group
Example:
CASA-CMTS(config)# logging source-interface
loopback 0
To specify a loopback interface as source IP address on FTP/TFTP packets initiated from the
CMTS. (This will also apply to TFTP packets for tftp-proxy feature).
Example:
CASA-CMTS(config)# ftp-tftp source-interface
loopback 0
Remove the configuration:
CASA-CMTS(config)# no ftp-tftp source-
interface loopback 0
To set the source IP address of lawful intercept packets to the loopback IP interface:
Example:
CASA-CMTS(config)# lawful-intercept source-
interface loopback 2
Example:
CASA-CMTS(config)# interface trunk 1
CASA-CMTS(conf-if-trunk 1#
Example:
CASA-CMTS(config)# interface trunk 1
CASA-CMTS(conf-if-trunk 1#
2 [no] ip address <address> <mask> Assign an IP
address to a
[no] ipv6 address <ipv6-address>/<mask_len> trunk interface.
Where:
<address> IP address assigned to the trunk interface.
<mask> IP address mask.
<ipv6-address> Text string for standard IPv6 address format:
xxxx:xxxx:xxxx:...:xxxx
<mask_len> Standard subnet mask.Usable addresses:
2001:0db8:0100:f101:0210:a4ff:fee3:9566
2001:0000:0000:0000:0000:0000:1000:1 (This
can be shortened to: 2001::1000:1)
One sequence of 20 bit blocks containing only
zeroes can be replaced with ::
Examples:
Where:
<num> Trunk interface number in the range 1 to 12.
Example:
CASA-CMTS(config)# interface trunk 1
CASA-CMTS(conf-if-trunk 1#
2 [no] shutdown Enable or disable a trunk
interface. The default is
Example: disabled.
Enable an interface:
CASA-CMTS(conf-if-trunk num)# no shutdown
Disable an interface:
CASA-CMTS(conf-if-trunk num)# shutdown
Where:
<num> Trunk interface number in the range 1 to 12.
Example:
CASA-CMTS(config)# interface trunk 1
CASA-CMTS(conf-if-trunk 1#
Example:
Add gige port 0 to trunk interface 1:
CASA-CMTS(conf-if-trunk 1# gige 0
Where:
<num> Trunk interface number in the range 1 to 12.
Example:
CASA-CMTS(config)# interface trunk 1
CASA-CMTS(conf-if-trunk 1#
2 [no] ip igmp Enable IGMP client
services on a trunk
interface.
Example:
Enable IGMP client services on trunk interface 1:
CASA-CMTS(conf-if-trunk 1# ip igmp
Where:
<num> Trunk interface number in the range 1 to 12.
Example:
CASA-CMTS(config)# interface trunk 1
CASA-CMTS(conf-if-trunk 1)#
2 [no] ip access-group <name> Apply or remove an IP
access group on a truck
Where: interface.
<name> IP access list name.
Example:
Apply IP-access list my_list to trunk interface 1:
CASA-CMTS(conf-if-trunk 1)# ip access-group
my_list
1 show interface trunk [<num>] [acl-count [details] | stat | Display trunk interface
throughput [duration] | service-policy-count [details] ] configurations.
Where:
<num> Specifies the trunk interface number in the
range 1 to 12.
acl-count Indicates the packet drop count from ACL
deny rules. Use the optional details
parameter to show the packet count per
rule.
stat Shows trunk interface statistics.
throughput Shows trunk interface throughput. Shows
Use the optional duration parameter to
display throughput over a specified
number of seconds (1 to 100).
service- Shows the packet count associated with
policy-count one or more policy rules. Use the optional
details parameter to show the packet
count per rule.
Example:
Display all trunk interface configurations:
CASA-CMTS(config)# show interface trunk
Example:
CASA-CMTS(config)# interface trunk 1
CASA-CMTS(conf-if-trunk 1)#
2 show arp
Example:
CASA-CMTS(config)# interface trunk 10
CASA-CMTS(conf-if-trunk 6/10)# show arp
Example:
CASA-CMTS(config)# lacp system priority 60000
Example:
CASA-CMTS(config)# interface gige 1
CASA-CMTS(config-if-gige 1)#
2 lacp port-priority <number> Configure LACP port
priority value.
Where:
<number> Port priority number in the range 1 to
65535
Example:
CASA-CMTS(config-if-gige 1)#lacp port-priority
1
Example:
CASA-C2200(config)#lacp system priority 1
Example:
CASA-CMTS(config)# interface gige 1
CASA-CMTS(config-if-gige 1)#
2 lacp port-priority <number> Configure LACP Port
priority value.
Where:
<number> Port priority number in the range 1 to
65535
Example:
CASA-CMTS(config-if-gige 1)#lacp port-priority
1
Example:
CASA-CMTS(config)# interface gige 1
CASA-CMTS(config-if-gige 1)#
2 no lacp priority Configure the LACP port
priority to the default
setting.
Example:
CASA-CMTS(config-if-gige 1)# no lacp priority
To display the LACP status of the port defined by the port number:
Step Command Purpose
1 show interface gige <port num> lacp status Display the LACP status
of the port defined by the
Where: port number.
<port GigE port number in the range 0 to 11 for
num> C3200/C10200; 0 to 3 for C2200.
Example:
CASA-CMTS# show interface gige 3 lacp status
Gige 3
In_Trunk 1,State: down
Port Priority 32768, Oper Key 0x1, Port Flag: CG
Receive Packets: 0, Send Packets: 0, Illegal Packets: 0
Where:
<num> Trunk interface number in the range 1 to 12.
Example:
CASA-CMTS(config)# interface trunk 1
CASA-CMTS(conf-if-trunk 1)#
2 [no] gige 1 [mode active] Add or remove a gige
port to a channel group.
Example:
CASA-CMTS(config-if-trunk 1)#gige 1 mode
active.
.
CASA-CMTS# show interface trunk 1
!
interface trunk 1
gige 1 mode active
gige 2 mode active
gige 3 mode passive
load-balance sdip
no shutdown
Where:
<num> Trunk interface number in the range 1 to 12.
Example:
CASA-CMTS(config)# interface trunk 1
CASA-CMTS(conf-if-trunk 1)#
2 [no] load-balance {smac | dmac | sdmac | sip | dip | sdip} Configure or disable the
trunk load-balance
Example: mode.
CASA-CMTS(conf-if-trunk 1)# load balance smac
Example:
CASA-CMTS(config)# interface gige 1
CASA-CMTS(config-if-gige 1)#
2 [no] ip router isis <string> Configure or disable an
IPv4 IS-IS under a GigE
Where: port.
<string> IPv4 routing process tag.
Example:
CASA-CMTS(config-if-gige 4)#ip router isis ABC
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] ipv6 router isis <string> Configure or disable an
IPv6 ISIS under a GigE
Where: port.
<string> IPv6 routing process tag.
Example:
CASA-CMTS(config-if-gige 0)#ipv6 router isis
ABC
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 isis circuit-type (level-1|level-1-2|level-2-only) Configure or disable
circuit type for a GigE
Where: interface.
Example:
CASA-CMTS(config-if-gige 0)#isis circuit-type
level-2-only
Disable the circuit type:
CASA-CMTS(config-if-gige 0)#no isis circuit-
type level-2-only
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] isis network point-to-point Configure a point-to-
point link between two
Example: IS-IS devices.
CASA-CMTS(config-if-gige 0)#isis network
point-to-point
To disable:
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] isis csnp-interval <num=0:65535> [(level-1|level-2)] Configure or disable the
CSNP interval in
Where: seconds.
<num=0:65535> CSNP interval value.
level-1 Level-1-2 adjacencies are formed
level-2 Level-2 only adjacencies are formed
Example:
CASA-CMTS(config-if-gige 0)#isis csnp-interval
40 level-1
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] isis hello-interval <num=1:65535> [(level-1 | level-2)] Setup or disable the ISIS
Hello interval in seconds
Where:
<num=1:65535> Hello interval in seconds.
level-1 Specify hello-interval for level-1 IIHs
level-2 Specify hello-interval for level-2 IIHs
Example:
CASA-CMTS(config-if-gige 0)#isis hello-
interval 40 level-2
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] isis hello-multiplier <num=2:100> [(level-1 | level-2)] Configure or disable the
ISIS Multiplier for Hello
Where: Holding time
<num=2:100> Hello multiplier value.
level-1 Specify hello multiplier for level-1 IIHs
level-2 Specify hello multiplier for level-2 IIHs
Example:
CASA-CMTS(config-if-gige 0)#isis hello-
multiplier 5 level-2
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
Disable:
CASA-CMTS(config-if-gige 0)#no isis hello
padding
CASA-CMTS(config-if-gige 0)#
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] isis metric <num=1:16777214> [level-1 | level-2] Configure or delete the
default IS-IS metric .
Where:
<num=0:16777214> Sets the default metric for IS-IS
circuit in the range 1 to 16777214.
level-1 Optional. Applies the specified
metric to Level-1 links.
level-2 Optional. Applies the specified
metric to Level-2 links.
Example:
CASA-CMTS(config-if-gige 0)#isis metric 40
CASA-CMTS(config-if-gige 0)#
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] isis password <string> [level-1 | level-2] Configure or disable
the IS-IS
Where: authentication
<string> Specifies the password string using up password for a GigE
to 255 characters. interface.
Example:
CASA-CMTS(config-if-gige 0)#isis password AAA
CASA-CMTS(config-if-gige 0)#
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
Example:
CASA-CMTS(config-if-gige 0)#isis priority 2 level-2
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] isis retransmit-interval <0-65535> Set the time
interval between
Where: retransmission
<0-65535> Specifies the time in seconds in the of the same
range 0 to 65535. LSPs over a
point-to-point
link.
Example:
CASA-CMTS(config-if-gige 0)#isis retransmit-interval
10
Example:
CASA-CMTS(config)#router isis local
CASA-CMTS(config-router-isis)#
metric-style (narrow|transition|wide)
net WORD
.
.
Example:
CASA-CMTS(config)#router isis local
CASA-CMTS(config-router-isis)#
summary-prefix X:X::X:X/M
Where:
Example:
CASA-CMTS(config-router-isis)# address-family ipv6
unicast
CASA-CMTS(config-router-isis-af)# default-information
originate
CASA-CMTS(config-router-isis-af)# multi-topology
transition
CASA-CMTS(config-router-isis-af)# summary-prefix
2001:1234::/64
CASA-CMTS(config-router-isis-af)# exit-address-family
Example:
CASA-CMTS(config-router-isis)# area-password abcXyZ
CASA-CMTS(config-router-isis)# area-password abcXyZ
authenticate snp validate
Example:
CASA-CMTS(config-router-isis)# authentication key-
chain charlie
CASA-CMTS(config-router-isis)#
Example:
CASA-CMTS(config-router-isis)# authentication mode
md5 level-1
CASA-CMTS(config-router-isis)#
Example:
CASA-CMTS(config-router-isis)# authentication send-
only
CASA-CMTS(config-router-isis)#
CASA-CMTS(config-router-isis)#no authentication
send-only
Example:
CASA-CMTS(config-router-isis)# domain-password
abcXyZ
CASA-CMTS(config-router-isis)# domain-password
abcXyZ authenticate snp validate
Level 1 areas share routing information within an area, while Level 2 routers share IP address
information among the IS-IS areas. Level 2 areas also interconnect all Level 1 areas, as well as
share link state information. IS-IS routers can also be configured as both Level 1 and Level 2
routers that share intra-area routes with other Level 1 routers and inter-area routes with other
Level 2 routers. Note that in networks having only one area, there is no need to run both Level 1
and Level 2 routing agorithms.
All routers maintain a link-state database of all other routers within the same level. Using the link-
state database, each router determines the shortest path to other routers. Use the show isis
database command to display the current link state statis
Example:
CASA-CMTS(config)#router isis local
CASA-CMTS(config-router-isis)is-type level-1#
Examples:
CASA-CMTS(config-router)#no lsp-gen-interval 50
LSP is allowed to exist in the routers link state the link state
database without being updated. The range is 350 to database with
65535 seconds for all routers. The default setting is being updated.
1200 seconds (or 20 minutes).
Examples:
CASA-CMTS(config-router)#no lsp-lifetime
Examples:
CASA-CMTS(config-router)# metric-style transition
47 AFI
0004.0000.0000 area identifier
Casa CMTS Software Configuration Guide 149
CASA CMTS
While the area identifier must be unique for each IS-IS area, the system identifier must the same
across all areas.
Example:
CASA-CMTS(config-router-isis)# net
47.0004.0000.0000.1234.5678.2005.00
CASA-CMTS(config-router-isis)# passive-interface
gige4
CASA-CMTS(config-router-isis)# passive-interface
loopback0
Where:
Example:
Configure IS-IS to advertise static routes to Level-2 routers:
Where:
on-startup Specifies the temportary time in seconds to
<seconds> advertise the CMTS as overloaded after a system
reboot in the range 5 to 86400 seconds.
suppress Specifies that IP prefixes from other protocols not
external be advertised when the overload bit is set.
Additionally, the interlevel option may be specified
to also suppress IS-IS routes.
suppress Specifies that IP prefixes from other IS-IS protocol
interlevel levels not be advertised when the overload bit is
set. Additionally, the external option may be
specified to also suppress IP prefixes from other
protocols.
Example:
CASA-CMTS(config-router-isis)#
Examples:
CASA-CMTS(config-router-isis)#spf-interval-exp 50
500
CASA-CMTS(config-router-isis)#spf-interval-exp
level-1 50 500
Examples:
CASA-CMTS(config-router-isis)#
CASA-CMTS(config-router-isis)#spf-interval-exp
level-1 50 500
1 show isis area <tag> database [detail [slot <number>] | l1 | l2 | Display the IS-IS
level-1 | level-2 | slot <number> ] area configuration.
Where:
<tag> Specifies the unique IS-IS routing area tag string.
database See Displaying the IS-IS link state database.
neighbors See Displaying the IS-IS neighbor routers.
topology See Displaying the IS-IS topologies.
detail Displays full IS-IS link state database information.
Optional system slot number may be specified.
l1 Level-1 link state database only.
l2 Level-2 link state database only.
level-1 Level-1 link state database only.
level-2 Level-2 link state database only.
slot IS-IS database statistics per specified system slot
number.
verbose Displays full IS-IS link state database information.
Optional system slot number may be specified.
Examples:
CASA-CMTS(config)#show isis area local database
detail
Example:
CASA-CMTS(config)#show isis counte
Area local:
IS-IS Level-1 isisSystemCounterEntry:
isisSysStatCorrLSPs: 0
isisSysStatAuthTypeFails: 0
isisSysStatAuthFails: 0
isisSysStatLSPDbaseOloads: 0
isisSysStatManAddrDropFromAreas: 0
isisSysStatAttmptToExMaxSeqNums: 0
isisSysStatSeqNumSkips: 0
isisSysStatOwnLSPPurges: 0
isisSysStatIDFieldLenMismatches: 0
isisSysStatMaxAreaAddrMismatches: 0
isisSysStatPartChanges:
1 show isis database [detail [slot <number> ]| l1 | l2 | level-1 | Display the IS-IS
level-2 | slot | verbose [slot <number>] ] database.
Where:
detail Displays full IS-IS link state database information.
Optional system slot number may be specified.
Example:
Where:
slot <number> Specifies the CMTS system slot number
over which IS-IS is running.
docsis-mac <id> Specifies the docsis-mac interface
number in the range 1 to 32
gige <slot/port> Specifies the CMTS GigE port number, or
the CMTS slot and port number
combination for C10200 and C10G
systems. GigE port number in the range
0 to 11 for C3200/C10200 and 0 to 3 for
C2200, and 0 to 7 on the C10G.
loopback <number> Specifies the logical loopback interface in
the range 0 to 15.
Example:
1 show isis neighbors [detail [slot <number>] | slot Show the ISIS neighbor
<number> ] database.
Where:
detail Displays full IS-IS neighbor information.
Optional system slot number may be
specified.
slot Specifies the IS-IS neighbor statistics per
<number> specified system slot number.
Example:
CASA-CMTS(config)#show isis neighbors
Area 160_isis:
Casa CMTS Software Configuration Guide 158
CASA CMTS
Area chris:
Area AAA:
1 show isis topology [level-1 [slot <number>] | Show the ISIS topology
level-2 [slot <number>] | slot <number> ] database.
Where:
level-1 Specifies the level-1 topology database
only.
level-2 Specifies the level-2 topology database
only.
slot Specifies the IS-IS topology statistics per
<number> specified system slot number.
Example:
CASA-CMTS(config)#show isis topology
Area 160_isis:
Area chris:
Area AAA:
PIM-SM is enabled and configured on GigE and loopback interfaces. Both IGMP and
PIM-SM cannot coexist on the same interface. To configure PIM-SM, IGMP (if previously
enabled) must be disabled in order for PIM-SM to operate on a CMTS interface.
The PIM-SM configuration on a CMTS GigE or loopback interface uses the following
elements:
Rendezvous Point (RP) address
RP candidate
Bootstrap router (BSR) candidate
Shortest Path Tree (SPT) threshold
Source-Specific Multicast (SSM)
Example:
CASA-CMTS(config)# interface gige 1
CASA-CMTS(config-if-gige 1)#
2 [no] ip pim sparse-mode Enable PIM-SM.
Where :
<ip_address> The IP address of the multicast group
rendezvous point. Use the no form of
the command to
access-list Optional: The named access-list reference delete the RP
<name> associated with the multicast group. address
assignment.
override Optional: Overrides dynamically learned
rendezvous point mappings.
Example:
CASA-CMTS(config)# ip pim rp-address 143.1.1.1.
access-list multicastList1
Example :
CASA-CMTS(config)#show ip pim rp
Group(s) 224.0.0.0/4, Static
RP 143.1.1.1, static
To configure an RP-candidate:
Where :
<number> The GigE or loopback interface number.
Use the no
form of the
command to
Example:
CASA-CMTS(config)# ip pim rp-candidate gige1 priority
5
2 show ip pim rp [mapping] Display the RP
show ip pim rp-hash <ip_address> groups and
mappings.
Where :
<ip_address> The IP address of the multicast group
rendezvous point.
Example :
CASA-CMTS(config)#show ip pim rp
Group(s) 224.0.0.0/4, Static
RP 143.1.1.1, static
To configure a BSR-candidate:
Example:
CASA-CMTS(config)# ip pim bsr-candidate gige1 10
5
2 show ip pim bsr-router Display the BSR
router configuration.
Example :
Example:
CASA-CMTS(config)# ip pim spt-threshold 1500
CASA-CMTA(config)# ip pim spt-threshold infinity
2 show ip pim spt-threshold Display the SPT
threshold setting.
Example :
To configure SSM:
Step Command (config) Purpose
Example:
CASA-CMTS(config)# ip pim ssm default
CASA-CMTA(config)# ip pim ssm range acl1
To remove an authentication specification of an OSPF area, use the no form of this command.
Step Command (config) Purpose
Example:
Enable authentication for areas 10 of OSPF routing process:
CASA-CMTS(config-router)# area 10
authentication
CASA-CMTS(config-router)#
CASA-CMTS(config-router)# no area 10
authentication
Example:
Assigns a default cost of 35 to stub network 192.168.3.2:
Disable a cost:
Casa CMTS Software Configuration Guide 168
CASA CMTS
Example:
Filters prefixes that are sent from all other areas to area 3:
Example:
Filters prefixes that are sent from all other areas to area 3:
Example:
Make area 3 a NSSA area with translate-always:
CASA-CMTS(config-router)# area 3 nssa translate-
always no-summary
Example:
Specify one summary route to be advertised by the ABR to other
areas for all subnets on network 192.168.2.3/24 with cost 20:
Disable:
CASA-CMTS(config-router)# no area 3 range
192.168.2.3/24 cost 20
Example:
CASA-CMTS(config-router)# area 3 SC enable
Disable:
CASA-CMTS(config-router)# no area 3 SC enable
Example:
Enable stub in area 3:
CASA-CMTS(config-router)# area 3 stub
Disable:
CASA-CMTS(config-router)# no area 3 stub
Where:
<id> Area identifier specified as either a
decimal value (0-4294967295) OR AN
IP address (A.B.C.D).
<router-id> Router ID associated with the virtual link
neighbor. The router ID appears in the
show ip ospf display and is internally
derived by each router from the interface
IP addresses. This value must be entered
in the format of an IP address. There is no
default.
message- Optional. Specifies authentication type
digest|null and if message-digest authentication is
used. If NULL, no authentication is used.
Overrides password or message digest
authentication if configured for the area.
hello-interval Optional .Time (in seconds) between the
<num> hello packets that the CMTS software
sends on an interface. Unsigned integer
value to be advertised in the hello
packets. The value must be the same for
all routers and access servers attached to
a common network. The default is
10 seconds. The range is from 1 to 8192.
retransmit- Optional. Time (in seconds) between link
Example:
Example:
Changes the cost of the FDDI link to 20:
CASA-CMTS(config-router)# auto-cost reference-
bandwidth 20
CASA-CMTS(config-router)# no auto-cost
reference-bandwidth 20
Example:
CASA-CMTS(config-router)# compatible rfc1583
Disable:
CASA-CMTS(config-router)# no compatible
rfc1583
Where:
always Optional. Always advertises the
default route regardless of whether the
software has a default route.
metric <metric- Optional. Metric used for generating
value> the default route. If you omit a value
and do not specify a value using the
default-metric router configuration
command, the default metric value is
1. The value used is specific to the
protocol.
metric type Optional. External link type associated
<type-value> with the default route advertised into
the OSPF routing domain. It can be
one of the following values: 1 for Type
1 external route, 2 for Type 2 external
route. The default is type 2.
route-map <map- Optional. Routing process will
name> generate the default route if the route
map is satisfied.
Example:
Specifies a metric of 50 for the default route redistributed into
the OSPF routing domain and an external metric type of Type
1:
CASA-CMTS(config-router)# default-information
originate metric 50 metric-type 1
Example:
Set default-metric value to 20:
CASA-CMTS(config-router)# default-metric 20
Example:
Set the external distance to 200:
Example:
CASA-CMTS(config)# router ospf
CASA-CMTS(config-router)#
2 list Display the OSFP
command list.
Example:
Set the external distance to 200:
CASA-C3000(config-router)# list
area (A.B.C.D|<0-4294967295>) authentication
area (A.B.C.D|<0-4294967295>) authentication
message-digest
area (A.B.C.D|<0-4294967295>) default-cost
<0-16777215>
area (A.B.C.D|<0-4294967295>) export-list
NAME
area (A.B.C.D|<0-4294967295>) filter-list
prefix WORD (in|out)
area (A.B.C.D|<0-4294967295>) import-list
NAME
area (A.B.C.D|<0-4294967295>) nssa
area (A.B.C.D|<0-4294967295>) nssa
(translate-candidate|translate-
never|translate-always)
area (A.B.C.D|<0-4294967295>) nssa
(translate-candidate|translate-
never|translate-always) no-summary
area (A.B.C.D|<0-4294967295>) nssa no-summary
area (A.B.C.D|<0-4294967295>) range A.B.C.D/M
area (A.B.C.D|<0-4294967295>) range A.B.C.D/M
advertise
area (A.B.C.D|<0-4294967295>) range A.B.C.D/M
advertise cost <0-16777215>
Example:
This example declares a router at address 192.168.3.20 on a non-
broadcast network, with a priority of 1 and a poll interval of 140
seconds:
CASA-CMTS(config-router)# neighbor 192.168.3.20
priority 1 poll-interval 140
Example:
Example:
Set ABR type to cisco:
CASA-CMTS(config-router)# ospf abr-type cisco
Example:
CASA-CMTS(config-router)# ospf router-id
192.168.3.20
A.B.C.D.
Example:
Configure OSPF passive interface ifname with address
10.10.10.3:
Example:
CASA-CMTS(config-router)# distribute-list list1 out
static
If this command is not specified in the interface configuration mode, then the interface adopts the
distribute list parameter specified by the area. If this command is not specified in the area
Casa CMTS Software Configuration Guide 183
CASA CMTS
configuration mode, then the interface adopts the distribute list parameter specified for the
process. If this command is not specified at any level, then the distribute list is disabled.
Example:
Configure OSPF to redistribute routes from static routes:
Example:
Set OSPF refresh value to 100 :
CASA-CMTS(config-router)# refresh timer 100
Example:
CASA-CMTS(config-router)# route-id
192.168.3.20
Example:
Configures routing timer in 60-millisecond intervals and
holding for 40 milliseconds:
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] timers spf <delay-time> <hold-time ip ospf Configure or disable IP
authentication [message-digest | null] OSPF Authentication.
Where:
Message-digest Optional. Specifies that message
digest authentication will be used.
null Optional. No authentication is
used. Useful for overriding
password or message digest
authentication if configured for an
area.
Example:
Enables message-digest authentication:
CASA-CMTS(config-if-gige 0)# ip ospf
authentication message-digest
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] ip ospf authentication-key <password> Configure or disable IP
OSPF password
Where: authentication.
<password> Any continuous string of characters that
can be entered from the keyboard up to 8
bytes in length.
Example:
Enables the authentication key with password neighbor:
CASA-CMTS(config-if-gige 0)# ip ospf
authentication-key neighbor
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] ip ospf cost <if-cost> Configure or disable the
IP OSPF cost.
Where:
<if-cost> Unsigned integer value expressed as the link
state metric in the range from 1 to 65535.
Example:
Set the interface cost value to 40:
Casa CMTS Software Configuration Guide 187
CASA CMTS
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] ip ospf dead-interval <num> Configure or disable
the IP OSPF dead
Where: interval.
<num> Interval (in seconds) during which the router must
receive at least one hello packet from a neighbor or
else that neighbor is removed from the peer list and
does not participate in routing. The range is 1 to
65535. The value must be the same for all nodes on
the network.
The default is four times the interval set by the ip ospf hello-
interval.
Example:
Set the OSPF dead interval to 33 seconds:
CASA-CMTS(config-if-gige 0)# ip ospf dead-
interval 33
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] ip ospf hello-interval <num> Configure or
disable the IP
Where: OSPF Hello
<num> Specifies the interval (in seconds). The value must interval.
be the same for all nodes on a specific network.
The range is 1 to 65535 seconds.
Example:
Set the interval between hello packets to 26 seconds:
CASA-CMTS(config-if-gige 0)# ip ospf hello-
interval 26
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
Example:
Set a new key 19 with the password 1007:
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] ip ospf retransmit-interval <num> Enable or disable
the IP OSPF
Where: retransmit interval.
<num> Time (in seconds) between retransmissions. It
must be greater than the expected round trip delay
between any two routers on the attached network.
The range is from 1 to 65535 seconds. The default
is 5 seconds.
Example:
Set the retransmit interval value to 10 seconds:
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] ip ospf transmit-delay <num> Enable or disable
the IP OSPF
Where: transmit delay.
<num> Time (in seconds) required to send a link state
update. The range is1 to 65535 seconds. The default
setting is 1 second.
Example:
Set the transmit delay value to 10 seconds:
CASA-CMTS(config-if-gige 0)# ip ospf transmit-
delay 10
1 show ip route [a.b.c.d | a.b.c.d/m | connected | kernel | ospf | Display IPv4 OSPF
static | bgp | rip | supernets-only ] routing information.
Where:
a.b.c.d Internet address in standard format.
m IP mask.
bgp Border Gateway Protocol routes.
connected Connected routes.
kernel Kernel routes.
isis IS-IS routes.
ospf OSPF routes.
static Static routes.
rip Routing Information Protocol routes.
supernets-only Supernets.
Example:
CASA-CMTS(config)# show ip route
Codes: K Kernel route, C - connected, S
static, R RIP, O OSPF,
I ISIS, B BGP, > - selected
route, * - FIB route
1 show ipv6 route [a.b.c.d | a.b.c.d/m | connected | kernel | isis | Display IPv6 OSPF
ospf | static | rip | bgp | supernets-only ] routing information.
Where:
a.b.c.d Internet address in standard format.
m IP mask.
bgp Border Gateway Protocol routes.
connected Connected routes.
kernel Kernel routes.
isis IS-IS routes.
ospf OSPF routes.
static Static routes.
rip Routing Information Protocol routes.
supernets-only Supernets.
Example:
CASA-CMTS(config)# show ipv6 route
Example 1:
Run OSPF actively on the gige interface, and redistribute the connected network in OSPF. All the
IP bundle networks will be injected into OSPF as external OSPF routes.
Example 2:
Run OSPF actively on the GigE interface.
network
offset-list
passive-interface
route
router-map
timers
version
ip rip authentication key-chain
ip rip authentication string
ip rip authentication mode
show ip rip
show ip rip status
show ip rip route
Example:
Assign the OSPF-derived routes a RIP metric of 10:
CASA-CMTS(config)# router rip
CASA-CMTS(config-router)# default-metric 10
Example:
Change the RIP routing distance to 100:
CASA-CMTS(config-router-rip)# distance 100
2 [no] distribute-list {<access-list> | prefix <list> {in | out [if- Configure the RIP filter
list] } } list.
Where:
access-list Access list name.
prefix Indicate that a prefix list is used.
list Name of IP prefix-list.
in Prefixes advertised to the specified area
Example:
Filters prefixes that are sent from all other areas to area 3:
CASA-CMTS(config-router)# distribute-list
prefix area_3 in
Example:
Send RIP updates to all interfaces on network 10.10.10.3:
CASA-CMTS(config-router)# neighbor 10.10.10.3
Example:
Defines RIP as the routing protocol to be used on all
interfaces connected to networks 10.10.10.3 and 192.168.3.4:
CASA-CMTS(config-router)# network
192.168.3.4/24
2 [no] offset-list <list-name> {in | out} <metric_value> [if-name] Configure the RIP
offset list.
Where:
<list-name> Standard access list name to be applied.
in Applies the access list to incoming
metrics.
out Applies the access list to outgoing
metrics.
<metric_value> Valid values are from 0 to 16.
<if-name> (Optional) Interface type to which the
offset list is applied.
Example:
Applies an offset of 15 to the delay component of a router only to
access list acl2:
Example:
CASA-CMTS(config-router)# passive interface
default
Example:
Configure RIP to redistribute routes from static routes:
Example:
CASA-CMTS(config-router)# route 192.168.2.3/24
Example:
Casa CMTS Software Configuration Guide 203
CASA CMTS
Where:
<update_timer> Rate (in seconds) at which updates
are sent. This is the fundamental
timing parameter of the routing
protocol. Values are 5 to
2147483647. The default is 30
seconds.
<timeout_timer> Routing information timeout timer in
the range 5 to 2147483647 seconds.
The default is 180 seconds.
<garbage_col_timer> Garbage collection timer in the range
5 to 2147483647. The default is 120
seconds.
Example:
Set updates to be broadcast every 5 seconds. If a router is not
heard from in 15 seconds, the route is declared unusable. Further
information is suppressed for an additional 15 seconds:
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] ip rip authentication key-chain <name> Configure or disable the
RIP authentication Key
chain.
Where:
<name> Name of the authentication key chain.
Example:
Applies authentication to autonomous system school:
CASA-CMTS(config-if-gige 0)# ip rip
authentication key-chain school
Disable:
CASA-CMTS(config-if-gige id)# no ip rip
authentication key-chain
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] ip rip authentication string <name> Configure or disable the
RIP authentication string.
Where:
<name> Authentication string name up to 16 characters.
Example:
Configure authentication string as public:
CASA-CMTS(config-if-gige 0)# ip rip
authentication string public
Disable:
CASA-CMTS(config-if-gige id)# no ip rip
authentication string
Example:
CASA-CMTS(config)# interface gige 0
CASA-CMTS(config-if-gige 0)#
2 [no] ip rip authentication mode { text | md5 [auth-length Configure or disable IP
rfc] } RIP authentication
mode.
Where:
text Text authentication mode.
Example:
Configure the interface to use MD5 authentication:
CASA-CMTS(config-if-gige 0)# ip rip
authentication mode md5 auth-length rfc
Bcm2 2 1 2
Routing for Networks:
192.168.3.0/24
Routing Information Sources:
Gateway Badpackets BadRoutes
Distance Last Update
Distance: (default is 120)
CASA-CMTS(config)#
Where:
a.b.c.d Internet address in standard format.
m IP mask.
bgp Border Gateway Protocol routes.
connected Connected routes.
kernel Kernel routes.
isis IS-IS routes.
ospf OSPF routes.
static Static routes.
rip Routing Information Protocol routes.
supernets-only Supernets.
Example:
CASA-CMTS(config)# show ip route
Codes: K Kernel route, C - connected, S
static, R RIP, O OSPF,
I ISIS, B BGP, > - selected
route, * - FIB route
1 show ipv6 route [a.b.c.d | a.b.c.d/m | connected | kernel | Display IPv6 route
isis | rip | static | bgp| ospf | rip | supernets-only ] information.
Where:
a.b.c.d Internet address in standard format.
m IP mask.
bgp Border Gateway Protocol routes.
connected Connected routes.
kernel Kernel routes.
isis IS-IS routes.
ospf OSPF routes.
static Static routes.
rip Routing Information Protocol routes.
supernets-only Supernets.
Example:
CASA-CMTS(config)# show ipv6 route
To enable a BGP protocol process with the specified autonomous system number (ASN), use the
BGP router command. This puts you in router configuration mode. After this statement you can
input any BGP commands. You cannot create different BGP processes under different ASNs
without specifying multiple-instance, as described later in this section.
Example:
CASA-CMTS(config)# router bgp 5
CASA-CMTS(config-router-bgp)#
Where:
<asn> The autonomous system number in the
range 1 to 65535.
Example:
CASA-CMTS(config)# router bgp 5
CASA-CMTS(config-router)#
2 bgp router-id A.B.C.D Specify the router-ID.
Example:
CASA-CMTS(config-router-bgp)# bgp router-id
A.B.C.D
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 5
CASA-CMTS(config-router-bgp)#
2 distance bgp <1-255> <1-255> <1-255> Change the BGP
distance value.
Where:
<1-255> Specifies the external distance
<1-255> Specifies the internal distance
<1-255> Specifies the local distance
Example:
CASA-CMTS(config-router-bgp)# distance bgp <1-
255> <1-255> <1-255>
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 5
CASA-CMTS(config-router-bgp)#
2 distance <1-255> A.B.C.D/M [name] Set a distance value to a
specified network.
Where:
<1-255> Defines the administrative distance value in
the range 1 to 255. A.B.C.D/M defines the
IP source prefix. The optional name defines
an IP access list name.
Example:
CASA-CMTS(config-router-bgp)# distance 5
60.3.4.5/24 list5
1. The CMTS will prefer the path with the largest value. The value is usually used to prefer
routes originated by the CMTS over routes originated by other routers.
2. If the routes have the same value, the CMTS will prefer the route with the largest local
preference.
3. If the route is originated locally, the CMTS will prefer it over a route that is not originated
locally.
4. The CMTS will use the shortest autonomous system (AS) path length.
5. If the autonomous system path length is the same, the CMTS will prefer the route with the
lowest origin code
6. If the origin codes are the same, the CMTS will prefer the route with the lowest Multi Exit
Discriminator (MED).
BGP routes
To announce a network to all neighbors (use the no form of the command to cancel the
announcement):
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 5
CASA-CMTS(config-router)#
2 [no] network <A.B.C.D/M> Announce a network to
all neighbors.
Where:
A.B.C.D/M IP network address and mask length. Use the no form of the
command to cancel the
announcement.
Example:
In this example network 10.0.0.0/8 will be announced to all
neighbors.
CASA-CMTS(config-router-bgp)# network
10.0.0.0/8
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 5
CASA-CMTS(config-router-bgp)#
2 aggregate-address A.B.C.D [as-set] [summary-only] Enable route
or aggregation.
aggregate-address A.B.C.D/M [as-set] [summary-only]
Where:
A.B.C.D The network number.
A.B.C.D/M The IP prefix and mask length.
as-set Generate AS set path information.
summary- Specify an aggregate address but not
only announce aggregated routes.
Example:
CASA-CMTS(config-router-bbp)# aggregate-
address 192.168.6.7/24 as-set summary-only
Redistribute to BGP
Step Command (config) Purpose
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 5
CASA-CMTS(config-router-bgp)#
2 redistribute kernel|static|connected|rip|ospf Redistribute routes.
Where:
kernel Redistribute a kernel route to a BGP process
static Redistribute static route to a BGP process:
connected Redistribute a connected route to a BGP
process
Example:
CASA-CMTS(config-router-bgp)# redistribute
kernel
CASA-CMTS(config-router-bgp)# redistribute
static
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router-bgp)#
2 [no] neighbor <peer_ip-address> remote-as <asn> Creates a new neighbor
whose remote-AS is
ASN. A peer can be an
Where: IPv4 address or an IPv6
<peer_ip-address> The IP address of the BGP peer. address.
CASA-CMTS(config-router-bgp)# neighbor
10.0.0.1 remote-as 2
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router-bgp)#
2 [no] neighbor <peer_ip-address> password <string> Creates an MD5
authentication password
associated with the BGP
Where: peer at the specified IP
<peer_ip-address> The IP address of the BGP peer. address.
CASA-CMTS(config-router-bgp)# neighbor
10.0.0.1 password
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router-bgp)#
2 [ no] neighbor <peer_ip-address> shutdown Specify shutdown or no-
shutdown of neighbor-
Where: specific configurations.
<peer_ip-address> IP address of the BGP peer.
Example:
CASA-CMTS(config-router-bgp)# no neighbor
64.10.1.0 shutdown
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 [no] neighbor <peer_ip-address> ebgp-multihop [max- EBGP neighbors not on
hop-count] directly connected
networks
Where:
<peer_ip-address> IP address of the BGP peer.
<max-hop-count> The maximum number of hops when
connecting to this BGP peer.
Example:
EBGP neighbors not on directly connected networks
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 [no] neighbor peer description <line> Add a description to a
peer (up to 80 lines):
Example:
CASA-CMTS(config-router)#[ no] neighbor peer
description <line>
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 neighbor <peer_ip-address> version <version> Set up the neighbors
BGP version.
Where:
<peer_ip-address> The IP address of the BGP peer.
<version> The version can be 4, 4+ or 4-. BGP
version 4 is the default value used
for BGP peering. BGP version 4+
means that the neighbor supports
Multiprotocol Extensions for BGP-4.
BGP version 4- is similar but the
neighbor uses the old Internet-Draft
revision 00s Multiprotocol
Extensions for BGP-4. Some routing
software is still using this version.
Example:
CASA-CMTS(config-router)#neighbor 192.168.3.1
version 4
When connecting to a BGP peer over an IPv6 link-local address, specify the ifname of the
interface used for the connection:
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 [no] neighbor <peer_ip-address> interface <ifname> Connect to a BGP peer
over an IPv6 link-local
Where: address.
<peer_ip-address> The IP address of the BGP peer.
<ifname> The interface name specified as a
text string.
Example:
CASA-CMTS(config-router)#neighbor 192.168.3.4
interface ifname
To specify an announced routes nexthop as being equivalent to the address of the BGP router:
Step Command (config) Purpose
Where:
<asn> Specifies the autonomous system
number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 [no] neighbor <peer_ip-address> next-hop-self Specify an announced
routes next hop as being
Where: equivalent to the address
<peer_ip-address> The IP address of the BGP peer. of the BGP router
Example:
CASA-CMTS(config-router)# neighbor 192.168.3.4
next-hop-self
To announce default routes to the peer, use this command. The default is to not announce the
default route (0.0.0.0/0) even if it is in the routing table.
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 [no] neighbor <peer_ip-address> default-originate Announce default routes
to the peer.
Where:
<peer_ip- The IP address of the BGP peer.
address>
Example:
CASA-CMTS(config-router)#[no] neighbor
192.168.3.4 default-originate
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 [no] neighbor <peer_ip-address> update-source <asn> Define the source of
routing updates
Where:
<peer_ip- The IP address of the BGP peer.
address>
<asn> The autonomous system number or
interface name.
Example:
CASA-CMTS(config-router)#[no] neighbor peer
update-source 4
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 [no] neighbor <peer_ip-address> send-community Send community
attributes to this
Where: neighbor.
<peer_ip- Specifies the IP address of the BGP peer.
address>
Example:
CASA-CMTS(config-router)# neighbor 192.168.3.4
send-community
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 [no] neighbor <peer_ip-address> weight <value> Specify a default value
for the neighbors routes
Where:
<peer_ip- The IP address of the BGP peer.
address>
<value> The default weight value for neighbor
routes in the range 0 to 65535.
Example:
CASA-CMTS(config)# neighbor 192.168.3.4 weight
5
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
Example:
CASA-CMTS(config)# neighbor 192.168.3.4
maximum-prefix 100
Casa CMTS Software Configuration Guide 220
CASA CMTS
Peer filtering
Specify a distribute-list for the peer (direct is in or out):
Step Command (config) Purpose
1 router bgp <asn> Enable BGP routing.
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 neighbor <peer_ip-address> distribute-list {<name> | Specify a distribute-list
<number> } {in | out} for the peer.
Where:
<peer_ip- The IP address of the BGP peer.
address>
<name> The name of an IP access list.
<number> The IP access list number in the range 1
to 199, or in the expanded range 1300 to
2699.
in Filters inbound updates.
out Filters outbound updates.
Example:
CASA-CMTS(config-router)# neighbor 192.168.3.4
distribute-list list1 in
Where:
<asn> Specifies the autonomous system
number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 neighbor <peer_ip-address> prefix-list <name> {in | out} Specify a prefix-list for
the peer.
Where:
<peer_ip- Specifies the IP address of the BGP
address> peer.
<name> Specifies the name of the prefix list.
Example:
CASA-CMTS(config-router)#neighbor peer prefix-
list prefixList1 out
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 neighbor <peer_ip-address> filter-list <name> [in | out] Specify a filer-list for the
peer:
Where:
<peer_ip- The IP address of the BGP peer.
address>
<name> The filter list name.
in Filters inbound updates.
out Filters outbound updates.
Example:
CASA-CMTS(config-router)#neighbor peer filter-
list filterList1 in
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 neighbor <peer_ip-address> route-map <name> {in | out} Apply a route map (5.4
only) to a neighbor.
Where:
<peer_ip- The IP address of the BGP peer.
address>
<name> The name of the route-map.
in Filters inbound updates.
out Filters outbound updates.
Example:
CASA-CMTS(config-router)#neighbor peer route-
map <name> [in | out]
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 neighbor word peer-group Define a new peer group
Example:
CASA-CMTS(config-router)#neighbor word peer-
group
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 neighbor <ip_-address> peer-group <name> Bind a specific peer to a
named peer group.
Example:
CASA-CMTS(config-router)#neighbor 192.168.3.4
peer-group peerGroup1
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 [no] address-family {ipv4 | ipv6 | vpnv4} [multicast | Configure a routing
unicast] session using address-
family ipv4, ipv6 or
Where: vpnv4.
ipv4 Internet Protocol Version 4; multicast or
unicast
ipv6 Internet Protocol Version 6; unicast only
vpnv4 Virtual Private Network Version 4 address
prefixes; unicast only.
multicast Optional. Specifies IP Version 4 multicast
address prefixes.
unicast Optional. Specifies IPv4, IPv6, or vpnv4
unicast address prefixes. This is the default
setting.
Example:
CASA-CMTS(config-router)# address-family ipv4
multicast
Where:
<name> Access-list name.
permit Forward packets specified by the regular
expression string.
deny Reject packets specified by the regular
expression string.
<string> AS path regular expression.
Example:
CASA-CMTS(config)#ip as-path access-list list1
permit regExpression
The communities attribute is a set of values where each value is 4 octets long. The following
format defines the communities attribute value.
Format Explanation
When the BGP communities attribute is received, the duplicate values in the communities
attribute are ignored. The values are sorted in numerical order.
There are two types of community lists: standard community and expanded community. The
standard community list defines the community attributes. The expanded community lists defines
the community attribute strings with regular expressions. The standard community list is compiled
into binary format when it is define and is directly compared to a BGP community attribute in BGP
updates. Therefore, the comparison is faster than the expanded community list.
Where:
<number> The standard community list number.
permit Community to forward as specified by the
community_number.
deny Community to reject as specified by the
community_number.
<community_ The community number in AA:NN format or
number> internet, local-AS, no-advertise, or no-export.
Community is compiled into the community
structure. The multiple community list is
defined under same name. In this case a
match will occur in the user-defined order.
Once the community list matches the
communities attribute in BGP updates, it
returns permit or deny by the community list
definition. When there is no matched entry, a
deny message is returned. When community
is empty it matches any routes.
Example:
CASA-CMTS(config)#ip community-list 123 permit
internet
To delete community lists specified by number, use the following command. All of the community
lists share a single namespace, so community lists can be removed by simply specifying the
community list number. Use the show running-config command to display BGP community
settings.
Example 1
The following configuration example is the most typical usage of the BGP community attribute.
AS 7675 provides upstream Internet connection to AS 100. When the following configuration
exists in AS 7675, the AS 100 network operator can set local preference in AS 7675 network by
setting the BGP community attributes to the updates.
Example 2
The following configuration announces 10.0.0.0/8 from AS 100 to AS 7675. The route has
communities value 7675:80 so when the above configuration exists in AS 7675, announced
routes local preference will be set to value 80.
Casa CMTS Software Configuration Guide 227
CASA CMTS
Example 3
The following configuration is an example of BGP route filtering using communities attribute. This
configuration only permits BGP routes that have a BGP communities value 0:80 or 0:90. The
network operator can put a special internal communities value at BGP border router and then limit
the BGP routes announcement into the internal network.
Example 4
The following example filters BGP routes that have community value 1:1. When there is no match
the community-list returns a deny response. To avoid filtering all of routes, define permit any at
the end.
Community value keyword internet has a special meaning in standard community lists. In the
following example internet acts as match any. It matches all of the BGP routes even if the route
does not have a community attribute at all. So community list INTERNET is the same as above
examples FILTER.
Example 5
The following configuration is an example of community value deletion. With this configuration
communities value 100:1 and 100:2 is removed from BGP updates. For community value
deletion, only permit community-list is used. The deny community-list is ignored.
Example 6
The following configuration announces 10.0.0.0/8 from AS 100 to AS 7675. The route has
communities value 7675:80 so when the above configuration exists in AS 7675, announced
routes local preference will be set to value 80.
Example 7
The following configuration is an example of BGP route filtering using communities attribute. This
configuration only permits BGP routes that have BGP community value 0:80 or 0:90. The network
operator can put a special internal community value at the BGP border router, and then limit the
BGP routes announcement into the internal network.
!
ip community-list 1 permit 0:80 0:90
!
route-map RMAP permit in match community 1
Example 8
The following example filters BGP routes that have the community value 1:1. When there is no
match the community-list returns a deny response. To avoid filtering all of routes, define permit
any at the end.
Community value keyword internet has a special meaning in standard community lists. In the
following example internet acts as match any. It matches all of the BGP routes even if the route
does not have a communities attribute. So community list INTERNET is the same as above
examples FILTER.
ip community-list standard INTERNET deny 1:1
ip community-list standard INTERNET permit internet
Example 9
The following configuration is an example of community value deletion. With this configuration
community value 100:1 and 100:2 are removed from BGP updates.
Example:
CASA-CMTS# show ip bgp paths
Example:
CASA-CMTS# show ip bgp scan
Example:
CASA-CMTS# show ip bgp attribute-info
Optionally, you can specify that the CMTS perform a soft reconfiguration update with one or
BGP peers without performing a full reset and losing connectivity to existing peers.
Where:
Examples:
Traditional BGP does not have the feature to detect the remote peers capability to handle other
than IPv4 unicast routes. This version of BGP uses a feature called Capability Negotiation to
detect the remote peers capabilities. If the peer is only configured as an IPv4 unicast neighbor,
the BGP daemon does not send these Capability Negotiation packets.
By default, this version of BGP will bring up peering with minimal common capability for both
sides. For example, if a local router has unicast and multicast capabilities and the remote router
has unicast capability, the local router will establish the connection with unicast only capability.
When there are no common capabilities, BGP sends Unsupported Capability error and then
resets the connection.
To disable sending the capability negotiation OPEN message optional parameter to the peer
when the remote peer does not implement capability negotiation, use the following:
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 [no] neighbor <peer_ip-address> dont-capability- Disable sending the
negotiate capability negotiation
OPEN message.
Where:
<peer_ip- The IP address of the BGP peer.
address>>
Example:
CASA-CMTS(config-router)# neighbor 192.168.3.4
dont-capability-negotiate
The no form of the command will suppress sending the capability negotiation as OPEN message
optional parameter to the peer. This command only affects the peer if it is configured other than
IPv4 unicast configuration.
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 bgp cluster-id <cluster_id> | Configure route-reflector
cluster identifier.
Where:
<cluster_id> Router reflector cluster identifier in IP
address format or in the range 1 to
4294967295
Example:
CASA-CMTS(config-router)# bgp cluster-id 300
Where:
<asn> The autonomous system number.
Example:
CASA-CMTS(config)# router bgp 1
CASA-CMTS(config-router)#
2 [no] neighbor <peer_ip-address> route-reflector-client Configure a BGP
neighbor as a route-
Where: reflector.
<peer_ip- The IP address of the BGP peer.
address>>
Example:
CASA-CMTS(config-router)# [no] neighbor peer
route-reflector-client
IP access control
The Casa CMTS provides a set of commands for users to control IP access to the system via
certain interfaces and access classes. The interfaces are the Ethernet management interface,
gigabit Ethernet data traffic interfaces, and DOCSIS mac-domain interfaces. The access classes
are incoming and outgoing classes. The access controls, deny or permit the flow of data traffic to
or from user-defined IP addresses and upper layer protocols specified in the IP protocol (TCP,
UDP) field, such as tcp, udp, tftp, telnet, etc.
To implement IP access control, the user needs to create an Access Control List (ACL) and apply
the ACL to specified system interfaces or access classes.
ACL is an ordered sequence of rules that control the flow of data packets through the system.
These rules may be used to permit or deny the flow of data traffic. ACLs help in restricting the use
of the system as desired based on the data traffic.
To create an ACL:
Step Command (config) Purpose
1 [no] ip access-list <acl_name> [resequence] Create an
access control
Where: list.
<acl_name> Name of ACL. A maximum of 32 ACLs are
allowed.
Example:
Create an ACL with name telnet_host:
CASA-CMTS(config)# ip access-list telnet_host
CASA-CMTS(conf-acl telnet_host)#
Example:
CASA-CMTS(config)# ip access-list telnet_host
CASA-CMTS(conf-acl telnet_host)#
To exit:
CASA-CMTS(conf-acl telnet_host)# end
CASA-CMTS(config)
Example:
CASA-CMTS(config)# ip access-list telnet_host
CASA-CMTS(conf-acl telnet_host)#
2 [sequence-number] permit[6] | deny[6] <protocol_name>|all Adds the
[sourceIP sourceMask destIP destMask destPort sourcePort] ACL rule.
Where:
[sequence-number] Specifies the order of the rule in the list. If
the sequence number is not specified, the
rule will be appended to the list. A
sequence number is a number from 1 to
32000. Sequence numbers are only for
informational purposes. They are not
Example:
ACL rule to permit telnet access from host 192.168.2.222:
CASA-CMTS(conf-acl telnet_host)# 100 permit telnet 192.168.2.222
CASA-CMTS(conf-acl telnet_host)#
3 no <sequence-number> Removes
the specific
Where: rule.
<sequence-number> The sequence number of the rule in the
list.
Example:
To remove control rule 100 from ACL telnet_host:
Casa CMTS Software Configuration Guide 238
CASA CMTS
Example:
CASA-CMTS(config)# ip access-list telnet_host
CASA-CMTS(conf-acl telnet_host)#
Where:
<acl-name> Name of ACL.
Example:
Display control rules specified in ACL telnet_host:
CASA-CMTS(config)# show ip access-list telnet_host
10 permit telnet 192.168.2.38 255.255.255.255.254
any
20 deny telnet any any
30 deny icmp 192.168.2.19 255.255.255.255 any
The above commands first permit telnet access from the host 192.168.2.222, and then disallows
telnet access from all hosts. If the order of the above two commands is reversed, all the telnet
access to the system will be denied.
When certain sequence numbers in a list are contiguous and it is necessary to insert a rule
between the successive sequence numbers, use the resequence command.
The sequence number is never stored as part of the system configuration. On restarting the
system, the starting sequence number defaults to 10 and the rules are resequenced to be in tens.
eth0
gige
loopback
trunk
vlan
docsis-mac
ip-bundle
Only one ACL may be specified per interface. The same list may be specified on multiple
interfaces.
To apply an ACL to an interface, first enter configuration mode for that interface and then specify
the access list name.
Example:
CASA-CMTS(config)# interface eth 0
CASA-CMTS(config-if-eth 0)#
Where:
<acl-name> Name of ACL.
Example:
Example:
CASA-CMTS(config)# interface gige 1
CASA-CMTS(config-if-gige 1)#
2 ip access-group <acl-name> Apply the ACL.
Where:
<acl-name> Name of ACL.
Example:
Apply ACL telnet_host to gigabit Ethernet port 1 interface:
Example:
CASA-CMTS(config)# interface gige 1
CASA-CMTS(config-if-gige 1)#
2 ip access-group <acl-name> Apply the ACL.
Where:
<acl-name> Name of ACL.
Example:
Apply ACL tftp_host to MAC-domain 1 interface:
Example:
Show the eth0 ACL count details:
CASA-CMTS# show interface eth 0 acl-count details
10 deny icmp 192.168.0.250 255.255.255.255
192.168.0.188 255.255.255.255 (8 matches)
To list all the interfaces that currently have a specific ACL applied (in 5.2; this command is
accessible from diagnostic mode in 5.4):
To show the packets dropped by the access list from the deny rules:
Step Command Purpose
1 show interface access-class [in | out] acl-count List the packets dropped
[details] by the access list from the
deny rules.
Note that the first 128 rules are implemented in one applied processor while the other 128 (when
an ACL has more than 128 rules) are implemented in another applied processor. If a packet
matches a rule in both lists, then both counters will increment. But the action will occur with the
first processor. The C2200 does not support 256 rules.
You create named route maps using match and set criteria at the CMTS. The match command
allows you to configure the criteria for selecting the route(s) to which a route-map applies, while
the set command modifies route information prior to redistribution.
When an inbound route is received at a CMTS interface, the CMTS evaluates the route against
configured route maps in numbered sequence for matching criteria, as follows:
When configuring BGP or OSPF, specify a named route-map with the redistribute command for
the targeted protocol.
dropped.
<sequence- The line number of the named route map in the
number> range 1 to 65535. The CMTS evaluates route
maps in sequence from the lowest number to the
highest number. The first match takes
precedence. If not specified, the default
sequence number is 10.
Example:
CASA-CMTS(config)# route-map cmtsNet1 permit 100
as-path
community
ip
metric
origin
peer
You must have at least one match entry in the route-map. Otherwise, all permitted inbound
routes on CMTS interfaces will be matched for redistribution to peer routers.
Example:
Casa CMTS Software Configuration Guide 246
CASA CMTS
To match inbound routes from a specific BGP community list, perform the following steps:
Example:
CASA-CMTS(conf-route-map cmtsNet1)# match community
70
Examples:
CASA-CMTS(conf-route-map cmtsNet1)# match ip
address as2
CASA-CMTS(conf-route-map cmtsNet1)# # match ip
next-hop as4
Examples:
CASA-CMTS(conf-route-map cmtsNet1)# match origin
egp
as-path
atomic-aggregate
community
ip
local-preference
metric
origin
originator-id
weight
You must have at least one set entry in the route-map. Otherwise, all permitted inbound routes
on CMTS interfaces will be redistributed to peer routers.
Example:
CASA-CMTS(conf-route-map cmtsNet1# set as-path
prepend 5
Format Explanation
Examples:
CASA-CMTS(conf-route-map cmtsNet1)# set origin egp
Configuring a VLAN
To configure a VLAN:
Where:
<num> VLAN ID from 2 to 3700 (5.4) or 256 to 4095
(5.2)
Example:
CASA-CMTS(config)#interface vlan 2
Example:
CASA-CMTS(config)#interface vlan 300 1000 2000
3000 3500 3600
or
CASA-CMTS(config)#no interface vlan 300 1000
2000 3000 3500 3600
Example:
CASA-CMTS(config)#interface vlan range 300 400
CASA-CMTS(conf-if-vlan 300)#
or
CASA-CMTS(config)#no interface vlan range 300
400
Where:
<vlan-id> Specifies the VLAN identifier from 2 to 3700
(5.4) or 256 to 4095 (5.2)
Example:
CASA-CMTS(config)#interface vlan 2
CASA-CMTS(conf-if-vlan 2)
2 mac address xxxx.xxxx.xxxx Configure the MAC
address.
Where:
xxxx.xxxx.xxxx Specifies the MAC address of the VLAN
interface.
Example:
CASA-CMTS(conf-if-vlan 2)#mac address
xxxx.xxxx.xxxx
Example:
CASA-CMTS(config)# interface vlan 256
CASA-CMTS(conf-if-vlan 256)#
2 gige <port> Specify the GigE
interface port
Where: number.
Example:
CASA-CMTS(conf-if-vlan 256)# gige 1
Example:
CASA-CMTS(config)# interface vlan 10
CASA-CMTS(conf-if-vlan 6/10)#
2 xgige <port> Specify the 10GigE
interface port
Where: number.
<port> Specifies the system slot number and
Ethernet port. On the C10G platform, valids
slot are 6 and 7; valid ports are 0 and 1.
Example:
CASA-CMTS(conf-if-vlan 6/10)# xgige 6/0
Example:
CASA-CMTS(config)# interface vlan 256
CASA-CMTS(conf-if-vlan 256)#
2 no gige <port> Specify the GigE
interface port
Where: number.
Casa CMTS Software Configuration Guide 259
CASA CMTS
Example:
CASA-CMTS(conf-if-vlan 256)# no gige 1
Example:
CASA-CMTS(config)# interface vlan 10
CASA-CMTS(conf-if-vlan 6/10)#
2 xgige <port> Specify the
10GigE interface
Where: port number for
<port> Specifies the system slot number and Ethernet removal.
port. On the C10G platform, valids slot are 6
and 7; valid ports are 0 and 1.
Example:
CASA-CMTS(conf-if-vlan 6/10)# no xgige 6/0
Example:
Example:
Assign IP address 192.168.3.100 to VLAN 10:
Example:
CASA-CMTS(config)# interface vlan 10
CASA-CMTS(conf-if-vlan 6/10)# gige 4
CASA-CMTS(conf-if-vlan 6/10)# show this
interface vlan 6/10
gige 6/4
no shutdown
Example:
Assign IPv6 address 2000::1000:1/64 to VLAN 10:
CASA-CMTS(config-if-vlan 6/10)# ipv6 address
2000::1000:1/64
Example:
CASA-CMTS(config)#interface vlan 10
2 rate-limit multicast <16 to 9999999> Configure the
number of
Where: multicast packets
<16 to 9999999> Specifies the number of multicast packets per second.
per second to be transmitted over this
VLAN interface. The default setting is no
rate limiting.
Example:
CASA-CMTS(config)# interface vlan 2
CASA-CMTS(conf-if-vlan 2)# rate-limit multicast
1500
Example:
Enter QAM Interface mode for interface on module 0, port 2:
CASA-CMTS(config)# interface qam 0/2
CASA-CMTS(conf-if-qam)#
2 [no] vlan <vlan-id> Assign a QAM port a
Where: VLAN. Use the no form
<vlan-id> VLAN ID. Valid values are 256 to 4095. of the command to un-
(Release 5.2); 2 to 3700 (Release 5.4) assign the QAM port.
Example:
Assign QAM port 0/2 to VLAN 256:
CASA-CMTS(conf-if-qam 0/2)# vlan 256
CASA-CMTS(config-if-qam 0/2)#
Where:
<num> VLAN ID from 2 to 3700 (5.4) or 256 to 4095
(5.2)
Example:
CASA-CMTS(config)#interface vlan 2
2 [no] ip access-group <string> Assign an IP access
group to a VLAN. Use
Where: the no form of the
<string> Specifies the access group name. command to remove the
assignment.
Example:
CASA-CMTS(conf-if-vlan)# ip access-group
my_access_group
CASA-CMTS(conf-if-vlan)# no ip access-group
my_access_group
Note: A given GigE interface may be present in only one trunk interface at a time. Before adding
a gigabit interface to a trunk interface, make sure that the interface has no IP address assigned.
For example, adding interface GigE 0 should not have an IP address.
Where:
<vlan-id> VLAN ID from 256 to 4095 (with Release
5.2); 2 to 3700 (with Release 5.4)
acl-count Indicates the packet drop count from ACL
deny rules.
brief Display the specified VLAN in abbreviated
form.
service-policy- Shows the packet count associated with
count one or more policy rules. Use the optional
details parameter to show the packet
count per rule.
Example:
CASA-CMTS(config)#show interface vlan
interface vlan 2
no ip igmp
interface vlan 300
gige 0
no ip igmp
CASA-CMTS(config)#
Casa CMTS Software Configuration Guide 265
CASA CMTS
Example:
CASA-CMTS(config)# interface vlan 10
CASA-CMTS(conf-if-vlan 6/10)#
2 show arp
Example:
CASA-CMTS(config)# interface vlan 10
CASA-CMTS(conf-if-vlan 6/10)# show arp
Configuring L2VPN
Casa CMTS supports L2VPN protocol which provides an end-to-end connection to an enterprise
office over a SPs MPLS or IP core. This section covers commands for the following L2VPN
operations:
L2VPN is primarily used by customers with multiple sites (like a business) who want all users to
be on the same LAN by virtually connecting cable modems and routers. The L2VPN is defined
outside of the CMTS where the cable modem configuration file contains the information about the
L2VPN. Because all L2VPN traffic is tagged before it reaches the CMTS, the CMTS knows which
cable modems are assigned to which L2VPN. When the CMTS receives the traffic tagged for a
particular L2VPN, it strips off the tag and forwards the traffic to the cable modem. When the cable
modem sends traffic to the CMTS, it adds the tag and forwards the traffic.
The CMTS also recognizes local traffic and can send that traffic directly to another cable modem
that is directly connected to it.
To retrieve information about the VPN on the CMTS, use the following command:
Example:
C10G-203(config)#show interface vlan 10
interface vlan 6/10
xgige 6/1
no ip igmp
no ip pim sparse-mode
no shutdown
Example:
CASA-CMTS(config)# interface vlan 400
CASA-CMTS(conf-if-vlan 400)#
Example:
CASA-CMTS(config)# interface vlan 400
CASA-CMTS(conf-if-vlan 400)#
2 [no] gige <port_num> Specify GigE or
trunk interface on a
[no] trunk <trunk_num>
L2VPN VLAN.
Where:
<port_num> GigE port number.
<trunk_num> Trunk interface number. Values are 1 to 16.
Note: A L2VPN may have more than one gige and trunk
interfaces.
Example:
CASA-CMTS(config)# no l2vpn mac-address-
movable
Example:
CASA-CMTS# show l2vpn local-traffic-forwarding
no l2vpn mac-address-movable
no l2vpn local-traffic-forwarding
Example:
C10G-203(config)#show l2vpn vlan 10
l2vpn vlan table: vlan_id=10
Example:
Where:
<host_addr> AAA host IP address in decimal format a.b.c.d.
Example:
CASA-CMTS(config)tacacs-server host 192.168.10.1#
Where:
<key> Server access keyword, and is case sensitive.
Example:
CASA-CMTS(config)# aaa authentication enable
default group radius
Example:
CASA-CMTS(config)# aaa authentication login
default group tacacsplus
Where:
default Use default login.
local Use local database.
radius Use radius server.
radius-local Use the sequence of radius then
local.
tacacsplus Use tacacsplus server.
tacacsplus-local Use the sequence of tacacsplus
then local
Example:
CASA-CMTS(config)# aaa authentication login
radius
Where:
<num> Enable level
group Authorization group
if-authenticated Go ahead if authenticated
local Use local
none No authorization
Example:
CASA-CMTS(config)# aaa authorization command 1
default local tacacsplus
To configure authorization exec shell default server group by tacacs plus server:
Step Command (config) Purpose
Example:
CASA-CMTS(config)# aaa authorization exec
default group tacacsplus local
Where:
if-authenticated Proceed if authenticated.
local Use local.
none No authorization.
group Server Group.
tacacsplus Tacacs plus server
Example:
aaa authorization exec default if-
authenticated group tacacsplus
Enabling accounting
To enable accounting:
Step Command (config) Purpose
Command accounting
To perform command accounting:
Step Command (config) Purpose
Where:
<num> Command level in the range 0 to 15.
none None.
start-stop Action start-stop.
stop-only Action on stop only.
Example:
CASA-CMTS(config)# aaa accounting commands 4
default start-stop
Example:
CASA-CMTS(config)# aaa radius-source loopback 4
Where:
host <string> Specify a RADIUS server with a certain
string.
key <string> Set RADIUS encryption key.
<number> 0 clear key to follow; 7 encrypted key
to follow.
retry-max Maximum retry value to connect to server,
default is 0.
timeout Timeout value in second, default is 5
second, won't be shown in startup.
Example:
CASA-CMTS(config)# radius server host server1
key 123 7
Example:
CASA-CMTS(config)# no radius server host
server1/123
The mapping of the IP encapsulated input SPTS to the output MPTS on QAM channels can be
done through translating a 4-tuple (source IP address, destination IP address, source UDP port
number, destination UDP port number) on the ingress side to a 2-tuple (QAM channel number
and PID) on the egress side.
Mode Description
Manual mode The C2200 system maps an incoming program to a QAM output
channel by using source and destination information specified in
stream configurations
RPC mode Similar to manual mode, but mapping configuration is remotely
provisioned from SDV (Switched Digital Video) server.
Auto Multiplex mode The Casa CMTS automatically maps the incoming program
using the destination IP address and UDP port number
embedded in the incoming program.
Group-4-port mode Similar to auto mode, but with a different mapping scheme. The
Casa CMTS translates 16 (8 for 2-chans/port) incoming
programs to 16 (8 for 2-chans/port) QAM output channels of 4
ports in a group. The ports in each group key off the IP address
of the first QAM port in each group.
Group-2-port mode Similar to auto mode, but with a different mapping scheme. The
Casa CMTS system translates 8 (4 for 2-chans/port) incoming
programs to 8 (4 for 2-chans/port) QAM output channels of 2
ports in a group. The ports in each group key off the IP address
of the first QAM port in each group.
source IP address
destination IP address
source UDP port number
destination UDP port number
For an incoming program, only the destination UDP port number needs to be specified; the
remaining fields can be used as wildcards.
Streams are indexed 1 9999. Each stream intended for unicast distribution can be mapped to
only one QAM channel. Streams for multicast distribution can be mapped to more than one QAM
channel.
You can map any number of streams to a single QAM channel. Each stream mapped to a QAM
channel occupies a program space whenever the stream is active. However, when mapping
streams to QAM channels, you must make sure that you do not exceed the maximum bit rate of
38/27 Mbps (with 256/64QAM modulation, Annex B) for all activated programs on each QAM
channel.
QAM manual operation mode is chassis based, applicable to all QAM ports as a group. To enable
the manual operation mode:
Example:
Enable QAM manual operation mode:
CASA-CMTS(config)# operation mode manual
CASA-CMTS(config)#
QAM RPC operation mode is chassis based, applicable to all QAM ports as a group. To enable
the RPC operation mode:
Example:
Enable QAM RPC operation mode:
The destination IP address is defined as the QAM port IP address. The destination UPD port
number is a 2-byte number of the form qqqqqqqqpppppppp. The bytes are defined as:
With these definitions, an incoming program can be uniquely mapped to a QAM output channel
(QAM port number, QAM channel number, and PID) automatically.
QAM auto-multiplex operation mode is chassis based, applicable to all QAM ports as a group.
The default is the auto-multiplex operation mode.
Example:
Casa CMTS Software Configuration Guide 279
CASA CMTS
1. The destination IP address is defined as the IP address configured to the first QAM port of a
QAM module, such as QAM output port-0/0, port-1/0, port-2/0, or port-3/0.
2. The destination UPD port number is a 2-byte number of the form qqqqqqqqpppppppp. The
bytes are defined as:
qqqqqqqq = QAM channel, 1 to 16 (1 to 8 for 2-chans/port)
pppppppp = Assigned program number, 1 to 255
Table 2-2 lists the explicit mapping between incoming UDP QAM-channels and output QAM-
channels for group-4-port mode.
Table 2-2. Mapping of Incoming UDP QAM Channels to QAM Output in Group-4-Port Mode
UDP QAM-Chan Output QAM-Chan <port>/<channel>
1 0/0
2 0/1
3 0/2
4 0/3
5 1/0
6 1/1
7 1/2
8 1/3
9 2/0
10 2/1
11 2/2
12 2/3
13 3/0
14 3/1
15 3/2
16 3/3
QAM group-4-port operation mode is chassis-based, applicable to all QAM ports as a group. To
enable the group-4-port operation mode:
Example:
Enable QAM group-4-port operation mode:
In group-2-port mode, the 4 QAM output ports of each QAM module are divided into two groups,
with each group having 2 ports and 8 channels. The mapping formats are:
1. The destination IP address is defined as the IP address configured to the first QAM port of a
desired group, such as port-0/0, port-0/2, port-1/0, or port-1/2, etc.
2. The destination UPD port number is a 2-byte number of the form qqqqqqqqpppppppp. The
bytes are defined as:
Table 2-3 illustrates the explicit mapping between incoming UDP QAM-channels and output
QAM-channels for group-2-port mode.
Table 2-3. Mapping of Incoming to Output UDP QAM Channels in Group-2-Port Mode
Output QAM-Chan <port>/<channel>
UDP QAM-
Destination IP = Destination IP =
Chan
QAM-port-0 IP QAM-port-2 IP
1 0/0 2/0
2 0/1 2/1
3 0/2 2/2
4 0/3 2/3
5 1/0 3/0
6 1/1 3/1
7 1/2 3/2
8 1/3 3/3
QAM group-2-port operation mode is chassis based, applicable to all QAM ports as a group. To
enable the group-2-port operation mode:
Example:
Enable QAM group-2-port operation mode:
CASA-CMTS(config)# operation mode group-2-port
CASA-CMTS(config)#
The de-jitter interval is a global setting; it applies to all streams in the system in either auto-
multiplex operation mode or manual mode.
Example:
Set de-jitter interval to 200 milliseconds:
CASA-CMTS(config)# dejitter interval 200
CASA-CMTS(config)#
Example:
Enter stream configuration mode. for stream 123:
CASA-CMTS(config)# stream 123
CASA-CMTS(config-stream 123)#
CASA-CMTS(config-stream)# end
CASA-CMTS(config)#
Example:
Enter stream configuration mode. for stream 123:
Example:
Set source IP address for stream 123 to 192.168.4.10:
Example:
Enter stream configuration mode. for stream 123:
CASA-CMTS(config)# stream 123
CASA-CMTS(config-stream 123)#
Example:
Set destination IP address for stream 123 to 192.168.3.10:
CASA-CMTS(config-stream 123)# no ip
destination address
CASA-CMTS(config-stream 123)#
Example:
CASA-CMTS(config)# stream 123
CASA-CMTS(config-stream 123)#
2 [no] udp source port <source-port> Set or remove stream
source UDP port.
Where:
<source-port> Source UDP port number in the range 1
to 9999.
Example:
Set source UDP port for stream 123 to 1234:
CASA-CMTS(config-stream 123)# udp source port
1234
CASA-CMTS(config-stream 123)#
Example:
Remove the configured source UDP port for stream 123:
Example:
CASA-CMTS(config)# stream 123
CASA-CMTS(config-stream 123)#
2 udp destination port <destination-port> Set or remove stream
destination UDP port.
Where:
<destination-port> Destination UDP port number in the
range 1 to 9999.
Example:
Set source UDP port for stream 123 to 4321:
Example:
Show the configuration of stream 14:
stream 2
For SPTS streams, use the following command to bind to a QAM output channel with an egress
program number:
For MPTS stream, use key word pass-through to bind the stream to a QAM output channel. In
this operation PCR will be re-stamped, but PIDs will be passed through unmodified.
Example:
Enter QAM Interface mode for interface on module 0, port 2:
CASA-CMTS(config)# interface qam 0/2
CASA-CMTS(config-if-qam)#
2 [no] channel <ch-id> stream <st-id> program <pr-id> Bind a stream to a QAM
[pass-through] output channel or
removes the bind.
Where:
<ch-id> QAM channel number; values are 0 to 3 (0 or 1
for 2 chans/port)
<st-id> Stream number in the range 1 to 9999.
<pr-id> Egress program number in the range 1 to 1000.
Example:
Bind the SPTS stream 123 to QAM channel 1 on port 0/2 with
egress program number 100:
Example:
Show unmapped streams in QAM module 0:
To test the set-up, ping the QAM IP address from the video server. Then verify that streaming is
working by sending the stream to a.b.c.d/257. UDP port 257 will map to QAM 0/0 channel 0.
Finally, tune the set top box to the frequency of the QAM 0/0 channel (0).
Example:
Enter QAM Interface mode for interface on module 0, port 0:
Example:
Enter QAM Interface mode for interface on module 0, port 0:
Note: The default state for all QAM ports and channels is shutdown. This prevents interference
with existing cable-channel configurations. If the QAM port is disabled, enabling the individual
channel will have no effect until the QAM port is enabled.
Example:
Enter QAM Interface mode for interface on module 0, port 0:
Example:
Enable QAM port 0 on module 0:
CASA-CMTS(config-if-qam)# no shutdown
CASA-CMTS(config-if-qam)#
Example:
Enter QAM Interface mode for interface on module 0, port 0:
CASA-CMTS(config-if-qam)# shutdown
CASA-CMTS(config-if-qam)#
Example:
Enter QAM Interface mode for interface on module 1, port 3:
Where:
<chan-id> QAM channel number; valid values are 0
through 3.
Example:
Enable QAM channel 1 on module 1, port 3:
Example:
Enter QAM Interface mode for interface on module 0, port 2:
Example:
Disable QAM channel 2 on module 0, port 2:
Example:
Enter QAM Interface mode for interface on module 1, port 2:
Example:
Set IP address to 192.168.3.211 and subnet mask to
255.255.255.0 for QAM port 2 on module 1:
Example:
Enter QAM Interface mode for interface on module 1, port 2:
CASA-CMTS(config)# interface qam 1/2
CASA-CMTS(config-if-qam 1/2)#
Example:
Set MAC address to 1234.2345.3456 for QAM port 2 on
module 1:
Example:
Enter QAM Interface mode for interface on module 0, port 3:
Example:
Set the modulation type for QAM outputs on module 0, port 3
to 64qam:
Note: QAM modulation is a port property. It applies to all four channels on the port. When the
modulation type is set to off, no modulation signal is transmitted to the QAM port. The RF output
of the port is a continuous wave.
Example:
Enter QAM Interface mode for interface on module 0, port 2:
Example:
Set the MPEG framing format to Annex B for QAM outputs on module 0,
port 2:
Where:
Example:
Set the MPEG framing format to Annex A for QAM outputs on module 0,
port 3 with symbol rate 6000 and channel spacing 7000000:
Note: In this example, assuming the center frequency of channel 0 was at 555 MHz, after the
Annex type setting, the center frequency of QAM channel 1 is then automatically adjusted to 562
MHz, channel 2 to 569 MHz, and channel 3 to 576 MHz
Each QAM module is completely independent of other modules within the same chassis. That
means some modules can be in high-frequency mode, while others are in normal mode.To set
the center frequency of the selected QAM channel follow the command provided below:
Example:
Enter QAM Interface mode for interface on module 0, port 3:
CASA-CMTS(config)# interface qam 0/3
CASA-CMTS(config-if-qam 0/3)#
2 channel <channel-id> frequency <freq> Set the QAM
frequency.
Note: The center frequencies for the four channels on the
same port are correlated. When any one is set, the others
change accordingly. The center frequency of each channel is
separated by 6 to 8 MHz, depending on whether the QAM port
is configured as Annex type B, C, or A.
Where:
<channel-id> QAM channel number; valid values are 0
through 3
<freq> QAM channel center frequency in Hz, from
47,000,000 to 999,000,000. The default
value for channel 1 is 549,000,000.
Example:
Set the center frequency of QAM channel 1 on module 0, port 3, to
555 MHz:
Example:
Enter QAM Interface mode for interface on module 0, port 3:
Example:
Set the output power level for RF port 0/2 to 550:
This power setting is for the RF output port that is also the sum of all enabled QAM channels on
the same port. The actual QAM channel output level depends on how many QAM channels are
enabled on that port. For example, a setting of 550 (55 dBmV for the port) with 1 channel
enabled, sets the QAM channel level to 55 dBmv. A setting of 550 with 2 channels enabled sets
each QAM channel to an output level of 52 dBmV. A setting of 550 with 4 channels enabled sets
each QAM channel to an output level of 49 dBmV.
Example:
Enter QAM Interface mode for interface on module 0, port 3:
Example:
Set the interleave level to 128x8 for QAM port 3 on module 0:
Note: When an interleave level is set, all channels on the port are set to the same interleave level
automatically
Example:
Enter QAM Interface mode for interface on module 0, port 3:
Showing the configurations and stream status of a specified QAM port interface.
Showing the configuration of a QAM channel and the streams bonded to it.
To show the configurations and stream status of a specified QAM port interface:
Step Command (config) Purpose
To show the configurations of a QAM channel and the stream bonded to it:
Example:
CASA-CMTS(config) show interface qam 2/1/0
utilization
Downstream Slot/Port/Channel Utilization (%)
2/0/0 2
2/0/1 2
2/0/2 2
2/0/3 2
2/1/0 0
2/1/1 0
2/1/2 0
2/1/3 0
2/2/0 0
2/2/1 0
2/2/2 0
2/2/3 0
2/3/0 0
2/3/1 0
2/3/2 0
2/3/3 0
Example:
See example below.
logical-channel 0 ranging-backoff 0 4
no logical-channel 0 pre-equalization
logical-channel 0 ranging-priority 0x0
logical-channel 0 class-id 0x0
no logical-channel 0 shutdown
no shutdown
voice-bw-reserve 75 emergency 0
rate-limit
no ingress-cancellation
logical-channel 0 prov-attr-mask 0x0
logical-channel 0 profile 3
logical-channel 0 minislot 4
logical-channel 0 data-backoff automatic
logical-channel 0 ranging-backoff 0 4
no logical-channel 0 pre-equalization
logical-channel 0 ranging-priority 0x0
logical-channel 0 class-id 0x0
no logical-channel 0 shutdown
no shutdown
Example:
Show interface upstream 1/0:
CASA-CMTS(config)# show interface upstream 1/0
interface upstream 1/0
frequency 20000000
channel-width 6400000
power-level 0
power-adjustment continue 2
power-adjust threshold 1
map-advance static 200
voice-bw-reserve 75 emergency 0
rate-limit
no ingress-cancellation
logical-channel 0 prov-attr-mask 0x0
logical-channel 0 profile 3
logical-channel 0 minislot 4
logical-channel 0 data-backoff automatic
logical-channel 0 ranging-backoff 0 4
no logical-channel 0 pre-equalization
logical-channel 0 ranging-priority 0x0
logical-channel 0 class-id 0x0
no logical-channel 0 shutdown
no shutdown
Example:
Show interface upstream 1/0:
Example:
Enter upstream
Example:
Enter upstream interface mode for upstream port 6 on module 2:
CASA-CMTS(config)# interface upstream 2/6
CASA-CMTS(config-if-ups 2/6)#
Example:
Enter upstream interface mode for upstream port 6 on module
2:
CASA-CMTS(config)# interface upstream 2/6
CASA-CMTS(config-if-ups 2/6)#
2 no shutdown Enable an upstream
port.
Example:
Enable upstream port 7 on module 3:
CASA-CMTS(config-if-ups 3/7)# no shutdown
CASA-CMTS(config-if-ups 3/7)#
Example:
Enter upstream interface mode for upstream port 6 on module
2:
CASA-CMTS(config)# interface upstream 2/6
CASA-CMTS(config-if-ups 2/6)#
2 shutdown Disable an upstream
port.
Example:
Disable upstream port 7 on module 3:
CASA-CMTS(config-if-ups 3/7)# shutdown
CASA-CMTS(config-if-ups 3/7)#
Example:
Enter upstream interface mode for upstream port 6 on module
2:
Example:
Enter upstream interface mode for upstream port 6 on module
2:
CASA-CMTS(config)# interface upstream 2/6
CASA-CMTS(config-if-ups 2/6)#
2 power-level <level> Set the upstream input
power level.
Where:
<level> Upstream input power level in dBmV. The
default setting is 0 dBmV. The valid range
depends on the data rate. At 1.6 MHz, the valid
range is 10 to 25 dBmV.
Example:
Set input power- level to 10 dBmV for upstream port 2/6:
Caution: Increases in the upstream port input power-level will lead to an increase in the CMs
transmit power-level. This creates higher carrier-to-noise ratio (C/N), but also generates distortion
products. Composite Second Order Beat (CSO) and Composite Triple Beat (CTB) values worsen
by 2 dB for every 1 dB-increased C/N. The return path laser immediately enters a nonlinear mode
called clipping, and all communication becomes unreliable. Many return lasers send short bursts
above the clipping thresholds and fail on longer or successive bursts. Input power level should
not be adjusted by more than 5 dB in a 30-second interval. If the power level is increased or
decreased by more than 5 dB within 30 seconds, cable interfaces are disrupted.
failed attempts, the CMTS stops sending ranging and the modem remains offline. For normal
operation, use the default value.
To adjust the upstream input power threshold, use the command power-adjustment threshold:
Step Command (config) Purpose
Example:
Enter upstream interface mode for upstream port 6 on module 2:
Example:
CASA-CMTS(config-if-ups 2/6)# power-adjustment
threshold 2
CASA-CMTS(config-if-ups 2/6)#
This command is helpful during troubleshooting, when a modem fails to complete ranging due to
the power level. This is usually due to attenuation in the cable plant. By setting the power-adjust
level higher, it is possible for the modem to complete ranging. For normal operation, use the
default value.
To adjust the upstream input power level to make it easier for CM to complete ranging, use the
command power-adjustment continue:
Example:
Enter upstream interface mode for upstream port 6 on module 2:
Example:
Set input power adjust level to 5 dBmV for upstream port 1/0:
MAP advance defines the amount of look-ahead time for MAPs based on the plant
characteristics. The system already has a built-in look-ahead time to account for internal
operation, like generating the MAP. You can set the MAP advance on the CMTS in either
dynamic or static mode.
Dynamic MAP advance automatically tunes the look-ahead time by calculating the offset to the
farthest modem on that upstream port. You can then specify a delay value that defines an
additional look-ahead time for MAPs to allow for internal latencies and inaccuracies in the
measurement system. The minimum delay value is 200 microseconds; the maximum is 2000
microseconds.
For example, map-advance dynamic 200 will set the look-ahead time to 200 microseconds more
than the time calculated by the dynamic MAP advance algorithm for the farthest modem on that
port.
Static MAP advance uses a fixed look-ahead time specified by the user. (For reference, a mile of
coax cable has a delay of about 7 microseconds; a mile of fiber has a delay of about 8
microseconds.) The minimum value is 200 microseconds; the maximum is 4000 microseconds.
For example, map-advance static 400 will set the look-ahead time to 400 microseconds.
The default is equivalent to map-advance static 3000. This is a conservative value. Using
large delay values increases the run-time look-ahead in MAPs, but is also reduces the upstream
performance. Casa recommends that that the MAP advance be adjusted for the physical
characteristics of the plant. A delay value of 200 ms is usually adequate.
For optimal performance, measure the throughput relative to the percent utilization and adjust the
delay value to achieve maximum throughput.
Example:
Enter upstream interface mode for upstream port 6 on module 2:
Where:
dynamic Enables the dynamic MAP advance algorithm
max-delay that automatically tunes look-ahead time in
MAPs based on the current farthest CM on a
particular upstream port. This value controls the
amount of extra look-ahead time in MAPs to
account for inaccuracies of the measurement
system and internal software latencies. The valid
range is 200 to 2000 microseconds, with a
default of 1000.
Example:
Set the dynamic map advance to 400 microseconds:
Defaults: Dynamic map-advance with a safety factor of 1000 microseconds and a max-delay of
1800 microseconds.
Example:
Enter upstream interface mode for upstream port 6 on module 2:
CASA-CMTS(config)# interface upstream 2/6
CASA-CMTS(config-if-ups 2/6)#
Example:
Enable logical-channel 0 under upstream 2/6:
Example:
Enter upstream interface mode for upstream port 6 on module 2:
CASA-CMTS(config)# interface upstream 2/6
CASA-CMTS(config-if-ups 2/6)#
2 logical-channel <num> shutdown Disable the upstream
logical-channels.
Where:
<num> Logical channel number. Valid values are 0 to
the supported logical channel minus one.
Example:
Disable logical-channel 0 under upstream 2/6:
The values are configurable and are power-of-two values. For example, a value of 4 indicates a
window between 0 and 15; a value of 10 indicates a window between 0 and 1023. The user can
set fixed start and end values for data backoff on the upstream ports, or set the upstream ports
for automatic data backoff. The user has the same options for ranging backoff. For both backoff
windows, the default start value is 0; the default end value is 4. Valid values are from 0 to 15.
Note: Automatic dynamic backoff algorithm is recommended for data transmission. For initial
ranging, use 4 and 10.
Example:
Enter upstream interface mode for upstream port 6 on module
2:
CASA-CMTS(config)# interface upstream 2/6
CASA-CMTS(config-if-ups 2/6)#
Where:
<num> Logical-channel number. Valid values are 0
to the supported logical channel minus one.
automatic Automatic data backoff adjustment
<start> Data backoff start value in the range 0 to 15.
<end> Data backoff end value, in the range 0 to 15.
Example:
Set data-backoff to 2 and 8 for channel 0 on interface 2/6:
Example:
Enter upstream interface mode for upstream port 6 on module
2:
CASA-CMTS(config)# interface upstream 2/6
CASA-CMTS(config-if-ups 2/6)#
2 logical-channel <num> data-backoff Set data-backoff values
to the default values of 0
Example: and 4.
Set upstream data backoff to default values 0 and 4 for
channel 0:
Example:
Enter upstream interface mode for upstream port 6 on module
2:
CASA-CMTS(config)# interface upstream 2/6
CASA-CMTS(config-if-ups 2/6)#
2 logical-channel <num> ranging-backoff <start> <end> Set ranging-backoff
values.
Where:
<num> Logical-channel number in the range 0 to the
supported logical channel minus one.
<start> Ranging backoff start value; valid values are 0 to
15.
<end> Ranging backoff end value; valid values are 0 to
15.
Example:
Set ranging-backoff to 4 and 10 (recommended) for channel 0
on upstream 2/6:
The upstream interface reconnection time after a power outage is related to the following factors:
DHCP, ToD, and TFTP servers often operate well below 1 percent load under normal
situations, but can jump to 100 percent after an outage.
Increasing backoff slows upstream interface reconnection and reduces server load.
Small backoffs result in upstream interfaces failing to range the upstream RF levels correctly
and cycling to maximum power, thus increasing connection time and reducing network
performance.
Large backoffs result in increased recovery time after a large scale service outage.
There is significant variation in cable interface performance (brand to brand) in
upstream interface restart time.
All upstream interfaces should recover in 0 to 10 minutes after all services are restored (Casa
CMTS, RF transport, DHCP, TFTP, and ToD servers). Problems in the cable modem
configuration, CMTS configuration, and the DOCSIS provisioning servers could lead to longer
recovery time.
Example:
Enter upstream interface mode for upstream port 6 on module 2:
Example:
Set minislot size to 64 ticks for channel 0:
Example:
Enter upstream interface mode for upstream port 6 on module 2:
Example:
Example:
Enter upstream interface mode for upstream port 6 on module 2:
Example:
Example:
Enter upstream interface mode for upstream port 6 on module
2:
CASA-CMTS(config)# interface upstream 2/6
CASA-CMTS(config-if-ups 2/6)#
2 [no] ingress-cancellation <intv> Enable or disable
ingress noise
Where: cancellation.
<intv> Sampling interval time for ingress cancellation in
milliseconds. Valid values are 10 to 1000. The
default setting is 200 milliseconds.
Example:
CASA-CMTS(config-if-ups 2/6)#ingress-
cancellation 100
Example:
Enter upstream interface mode for upstream port 6 on module 2:
Example:
casa-121(config-if-ups 3/6)#voice-bw-reserve 75
emergency 10
casa-121(config-if-ups 3/6)#
Note: To allow emergency calls to preempt all other calls, use the top-level cable admission-
control preempt priority voice command. The default setting is enabled. Additionally, the
interface upstream rate-limit setting that enforces cable modem limits at the CMTS is enabled by
default.
Example:
Enter upstream interface mode for upstream port 6 on module 2:
Example:
To show the SNR of all the upstream channels:
Example:
To show the statistics of upstream interface 1/0:
To create or enter an IP-bundle interface, use the interface ip-bundle command in configuration
mode.
Example:
Create an IP-bundle interface with ID=2:
Example:
Create an IP-bundle interface with ID=2:
Example:
Add primary IP address 10.248.1.1 to IP-bundle interface 2:
Example:
Example:
Add a secondary IP address 10.248.4.1 to IP-bundle interface 1.511.
Example:
Create an IP-bundle sub-interface with the identifier 1.511
decimal format.
Example:
Remove a secondary IP address 10.248.4.1 to IP-bundle
interface1.511:
Example:
Create an IP-bundle sub-interface with the identifier 1.511:
Example:
Assign IPv6 address 2000::1000:1/64 to a secondary IP bundle
interface.
Adding a helper-address
To specify a destination IP address for User Datagram Protocol (UDP) broadcast Dynamic Host
Configuration Protocol (DHCP) packets, use the helper-address command in the ip-bundle
configuration mode. To disable this feature, use the no form of this command. Many helper-
addresses can be added in each IP-bundle interface.
Example:
Create an IP-bundle interface with ID=2:
Where:
<ip_addr> The IP address of a DHCP server to which
UDP broadcast packets will be sent.
<ipv6_address>/ The IP address of a DHCP server to which
UDP broadcast packets will be sent in standard
IPv6 address format: xxx:xxxx:xxxx:...:xxxx
host (Optional) Specifies that only host UDP
broadcasts are forwarded by the CMTS
mta (Optional) Specifies that only MTA UDP
broadcasts are forwarded by the CMTS
Example:
Forward UDP broadcasts from both CMs and CPE devices to the
DHCP server at 10.243.6.4:
If the CM's IP is in the subnet of 172.18.32.0/24, the DHCP discovery for the CPE will have
source IP of 192.168.254.254;
If the CM's IP is in the subnet of 10.0.0.0/24, the DHCP discovery will have source IP of
192.168.54.254;
If the CM's IP is in the subnet of 192.168.5.0/24, the DHCP discovery will have source IP of
10.110.50.25.
interface ip-bundle 1
ip address 172.18.32.4 255.255.255.0
ip address 192.168.254.254 255.255.255.0 secondary
cable helper-address 172.18.4.239
ip access-group 123
Example:
Create a new MAC domain interface with domain id = 2 or
enter an existing one:
Example:
Bind ip-bundle 6 to MAC domain:
Using the cpe-class command, define a named cpe-class grouping, and then specify any
number of DHCP option 60 strings that the CMTS will match to configured DHCP server IPs.
When the CMTS receives a DHCP option 60 string from a vendor CPE device, the CMTS will
check the IP-bundle and cable helper addresses for a matching string. If the string match exists,
the CMTS forwards the request to the DHCP server IP address and awaits a DHCP response
that the CMTS will return to the requesting CPE.
In the following CLI session, the cpe-class command defines two CPE classes: setTopBoxes
and computers. A CPE class name can have up to 11 alphanumeric characters. Each class
includes one or more DHCP option 60 strings (with up to 32 alphanumeric characters).
In this example, stbUser1 and pcUser1 are the expected DHCP option 60 strings from the CPEs.
The CMTS will check the IP-bundle and cable helper-address (DHCP server address) CPE
classes for the matching strings.
The CPE device with the DHCP option 60 string of stbUser1 will get its IP address from the
DHCP server at IP 192.168.3.16. Similarly, the CPE device with DHCP option 60 string of
pcUser1 will get its IP address from the DHCP server at 192.168.3.17.
CASA(config)#cpe-class setTopBoxes
CASA(conf-cpe-class stb)#dhcp option 60 stbUser1
CASA(config)#cpe-class computers
CASA(conf-cpe-class stb1)#dhcp option 60 pcUser1
CASA(conf-cpe-class stb1)#end
CASA(config)#interface ip-bundle 1
CASA(ip-bundle 1)# ip address 10.231.1.1 255.255.255.0
CASA(ip-bundle 1)# ip address 10.231.13.1 255.255.255.0 setTopBoxes
CASA(ip-bundle 1)# ip address 10.231.20.1 255.255.255.0 computers
If a received DHCP option 60 string does not match the CMTS configuration, the CPE client
request will be forwarded to the default DHCP server (at 192.168.3.6 in the above example.)
Use the show cpe-class command to display the configured DHCP classes and option 60
strings.
Example:
Create a new cpe-class named computers.
Example:
Bind ip-bundle 6
Example:
CASA-CMTS(config)# interface ip-bundle 1
CASA-CMTS(ip-bundle 1)#
2 [no] ip rip authentication key-chain <name> Configure or disable the
RIP authentication Key
Where: chain.
<name> Name of the authentication key chain.
Example:
Applies authentication to the autonomous system named
school:
To disable:
CASA-CMTS(ip-bundle 1)# no ip rip
authentication key-chain
Example:
CASA-CMTS(config)# interface ip-bundle 1
CASA-CMTS(ip-bundle 1)#
2 [no] ip rip authentication string <name> Configure or disable the
RIP authentication string.
Where:
<name> Authentication string name up to 16 characters.
Example:
Configure authentication string as public:
To disable:
CASA-CMTS(ip-bundle 1)# no ip rip
authentication string
Example:
CASA-CMTS(config)# interface ip-bundle 1
CASA-CMTS(ip-bundle 1)#
2 [no] ip rip authentication mode { text | md5 [auth-length Configure or disable IP
rfc] } RIP authentication
mode.
Where:
text Text authentication mode.
md5 MD5 authentication mode.
Example:
Configure the interface to use MD5 authentication:
CASA-CMTS(config-if-gige 0)# ip rip
authentication mode md5 auth-length rfc
1 show interface ip-bundle [<num>] [acl-count [details] | brief | stat | Display the IP-
throughput [duration] | service-policy-count [details] ] bundle
configuration
Where: and statistics.
<num> The number of the IP bundle interface in the range
1 to 16.
acl-count Indicates the packet drop count from ACL deny
rules. Use the optional details parameter to show
the packet count per rule.
ip-bundle: 1
upstream bytes: 144574
upstream packets: 2118
downstream unicast bytes: 96070
downstream multicast bytes: 0
downstream total bytes: 96070
downstream unicast packets: 446
downstream multicast packets: 0
downstream total packets: 446
Upstream and downstream channels operation is in shutdown state unless they are bounded in
an enabled MAC domain. A MAC domain cannot be enabled without IP address, helper address,
at least one downstream and upstream. In the 5.4 and later versions of the software, the IP
addresses must be configured in an IP bundle interface that is assigned to the MAC domain.
This section describes the commands for domain management. It covers following:
Displaying domain interface configurations
Creating new domain interfaces
Entering domain interface configuration mode
Ending the domain interface configuration session
Removing domain interfaces
Binding IP-bundle interfaces
Binding upstream interfaces
Binding downstream interfaces
Binding secondary downstream interfaces
Deleting upstream interfaces
Deleting downstream interfaces
Enabling MAC domain interfaces
Disabling MAC domain interfaces
Setting domain interface IP addresses (5.2 only)
Setting domain interface IPv6 addresses
Removing domain interface IPv6 addresses
Setting the helper-address (5.2 only)
Setting IP bundle interfaces
Setting the domain sync-interval
Setting the upstream insertion interval
Setting the MDD interval
Enabling/disabling the TFTP proxy on MAC domain interfaces
Configuring multicast on MAC domain interface
Enabling/disabling DHCP authorization on MAC domain interface
Configuring channel bonding on MAC domain interfaces
Configuring IP-provisioning-mode on MAC domain interfaces
Displaying MAC domain interface configurations and statistics
Where:
<domain-id> MAC domain number. The valid values are
1 to 32.
Example:
Show configurations for all MAC domains, assume the chassis has
48 downstream channels and 8 upstream channels that bound to 8
upstream-port interfaces:
Example:
Create a new MAC domain interface with domain id = 2 or enter
an existing one:
Example:
Bind ip-bundle 6 to MAC domain:
Example:
Create a new MAC domain interface with domain id = 2 or enter
an existing one:
Example:
Bind upstream 1/1/0 to domain 2 with channel ID 5:
CASA-CMTS(config-if-mac 2)# upstream 5 interface
upstream 1/1/0
Example:
Create a new MAC domain interface with domain id = 2 or enter
an existing one:
Example:
Remove bond upstream 5 from domain 2:
Example:
Create a new MAC domain interface with domain id = 2 or enter an
existing one:
CASA-CMTS(config-if-mac 2)#
2 downstream <chan-id> interface qam <x/y/z> Bind downstream
interfaces.
Where:
<chan-id> User-defined channel identity in the range 1 to
255 and is unique within a MAC domain.
<x> Module number.
<y> Port number.
<z> Channel number in the range from 0 to 3.
Example:
Bind downstream 0/2/1 to domain 2 with channel ID 3:
Note: One primary downstream channel can only bind to one MAC domain.
Example:
Create a new MAC domain interface with domain id = 2 or enter an
existing one:
Example:
Bind secondary downstream 0/2/1 to domain 2 with channel ID 3:
Example:
Create a new MAC domain interface with domain id = 2 or
enter an existing one:
Example:
Remove bound downstream 3 from domain 2:
CASA-CMTS(config-if-mac 2)# no downstream 3
Example:
Create a new MAC domain interface with domain id = 2 or
enter an existing one:
Example:
Create a new MAC domain interface with domain id = 2 or
enter an existing one:
Example:
Create a new MAC domain interface with domain id = 2 or enter an
existing one:
Setting MAC domain interface IPv6 addresses (Rel. 5.2 and earlier)
To set the IPv6 address for a MAC domain interface:
Step Command (config) Purpose
Example:
Create a new MAC domain interface with domain id = 2 or
enter an existing one:
Example:
Assign IPv6 address 2000::1000:1/64 to domain 2:
Removing MAC domain interface IPv6 addresses (Rel. 5.2 and earlier)
Step Command (config) Purpose
Example:
Create a new MAC domain interface with domain id = 2 or
enter an existing one:
Where:
<ip_addr> The IP address of a DHCP server to
which UDP broadcast packets are sent.
cable-modem Optional. Specifies that only CM UDP
broadcasts are forwarded.
Example:
Forward UDP broadcasts from both CMs and CPE devices to
the DHCP server at 172.23.66.44:
Defaults: If no options are specified, both CM and host UDP broadcasts are forwarded.
Note: The user must specify both the cable-modem or host options in separate commands, using
separate IP addresses, if using them. If the user specifies only one option, then the other type of
device (cable modem or host) will not be able to connect with a DHCP server. In addition, if the
cable-modem or host option is used with the same IP address that was previously configured with
this command, the new configuration overwrites the old configuration
This command enables CMs and their attached CPE devices (hosts) to use separate DHCP
servers, so that CMs and hosts receive their IP addresses from separate address pools. The
cable-modem keyword specifies that only UDP DHCP broadcasts from CMs are forwarded to
that particular destination IP address. The host keyword specifies that only UDP broadcasts from
hosts (CPE devices) are forwarded to that particular destination IP address.
Example:
Example:
Set the interval for the sync message transmissions to 100 ms:
Example:
Set the minimum insertion interval to 100 ms:
Example:
Create a new MAC domain interface with domain id = 2 or enter
an existing one:
Example:
Set the minimum insertion interval to 100 ms:
Example:
Create a new MAC domain interface with domain id = 2 or enter
an existing one:
Example:
CASA-CMTS(config-if-mac 2)# dhcp-giaddr-primary
Example:
Create a new MAC domain interface with domain id = 2 or enter
an existing one:
Example:
Create a new MAC domain interface with domain id = 2 or enter
an existing one:
Example:
Create a new MAC domain interface with domain id = 2 or
enter an existing one:
domain interface,
Disable: remove the no command
CASA-CMTS(config-if-mac 2)# mgmd ipv4 shutdown at the beginning of the
CASA-CMTS(config-if-mac 2)# command.
Example:
Create a new MAC domain interface with domain id = 2 or
enter an existing one:
Example:
Create a new MAC domain interface with domain id = 2 or
enter an existing one:
Disable:
CASA-CMTS(config-if-mac 2)# no upstream
channel bonding
Example:
Create a new MAC domain interface with domain id = 2 or
enter an existing one:
Example:
Create a new MAC domain interface with domain id = 2 or
enter an existing one:
Example:
Enable dual-stack ip-provisioning-mode on docsis-mac
domain 2:
enable
cur-hop-limit
life-time
link-mtu
managed-flag
max-advertising-interval
min-advertising-interval
other-config-flag
prefix
reachable-time
retransmit-time
Where:
enable Specifies the default router-advertisement setting.
Use the no form of the command to disable IPv6
router advertisements.
Examples:
Example:
Create a new MAC domain interface with domain id = 2 or
enter an existing one:
Example:
Set tek life-time to be 300 on docsis-mac domain 1:
To configure the cable modem trap and the trap interval on a MAC domain interface:
Step Command (config) Purpose
Example:
Create a new MAC domain interface with domain id = 2 or
enter an existing one:
Example:
CASA-CMTS(config-if-mac 2)# cm trap
CASA-CMTS(config-if-mac 2)# cm trap interval
20000
Example:
Ifindex: 77
Administrated status: UP
Operation status: UP
Mac address: 0017.1000.2647
DSA Request : 0/ups; 0/ds
DSA Response : 0/ups; 0/ds
DSA Acknowledgements : 0/ups; 0/ds
DSA Success : 0/ups; 0/ds
DsA Fail : 0/ups; 0/ds
DSC Request : 0/ups; 0/ds
DSC Response : 0/ups; 0/ds
DSC Acknowledgements : 0/ups; 0/ds
DSC Success : 0/ups; 0/ds
DSC Fail : 0/ups; 0/ds
DSD Request : 0/ups; 0/ds
DSD Response : 0/ups; 0/ds
DSD Success : 0/ups; 0/ds
DSD Fail : 0/ups; 0/ds
DCC Request : 0/ups; 1/ds
DCC Response : 2/ups; 0/ds
DCC Acknowledgements : 0/ups; 1/ds
DCC Success : 0/ups; 1/ds
DCC Fail : 0/ups; 0/ds
DCC RSP Depart : 1/ups; 0/ds
DCC RSP Arrive : 1/ups; 0/ds
DBC Request : 0/ups; 0/ds
DBC Response : 0/ups; 0/ds
DBC Acknowledgements : 0/ups; 0/ds
DBC Success : 0/ups; 0/ds
DBC Fail : 0/ups; 0/ds
DBC Partial Service : 0/ups; 0/ds
This section describes the service group management commands. It covers the following:
Creating a new service group
Entering service group configuration mode
Ending a service group configuration session
Removing a service group
Binding upstream interfaces
Removing upstream interfaces
Example:
Create a new service group 2:
CASA-CMTS(config)# service group 2
2 [no] upstream [<X/Y.Z> | <X/Y>] Bind upstream
interfaces.
Where:
<X> Module number. To remove upstream
interface binding,
<Y> Port number. use the no form of
Physical channel number, RTN3 upstream module the command.
<Z>
supports two physical channels for each port.
Casa CMTS Software Configuration Guide 359
CASA CMTS
Example:
Bind upstream 1/1.0 to service group 2:
Example:
Bind downstream 0/2/1 to service group 2:
Example:
Display service group 1:
Example:
CASA-CMTS(config)#show md-ds-sg
docsis-mac 1 service-group 1
qam 0/1/0
qam 0/1/1
qam 0/1/2
qam 0/1/3
docsis-mac 1 service-group 2
qam 0/2/0
qam 0/2/1
qam 0/2/2
qam 0/2/3
Example:
CASA-CMTS#show md-ds-sg mac 1 service-group 1
docsis-mac 1 service-group 1
qam 0/2/0
qam 0/2/1
qam 0/2/2
qam 0/2/3
Example:
CASA-CMTS#show md-ds-sg service-group 1
docsis-mac 1 service-group 1
qam 0/2/0
qam 0/2/1
qam 0/2/2
qam 0/2/3
Example:
CASA-CMTS#show md-us-sg mac 1 service-group 1
docsis-mac 1 service-group 1
upstream 1/4/0
Casa CMTS Software Configuration Guide 362
CASA CMTS
upstream 1/5/0
upstream 1/6/0
upstream 1/7/0
A bonding group automatically forms when a MAC domain and service group is configured. A
bonding group will form for each unique intersection of the service group channels and the MAC
domain channels.
This section describes the commands for bonding-group management. It covers the following:
Creating a new downstream/upstream bonding group
Entering downstream/upstream bonding-group configuration mode
Removing a downstream/upstream bonding group
Binding downstream/upstream interfaces to a bonding group
Removing downstream/upstream interfaces from a bonding group
Displaying configured bonding groups
Example:
Create a new downstream bonding-group with mac-domain 1
and group ID 1:
Example:
Create a new downstream bonding-group with mac-domain 1
and group ID 1:
Where:
<md_id> MAC domain ID in the range 1 to 32.
<grp_id> Bonding group ID in the range 1 to
65535
Example:
Create a new upstream bonding-group with mac-domain 1
and group ID 1:
Example:
Bind upstream 1/1.0/0 to bonding-group 1:
CASA-CMTS(bond-us-mac-1group-1)# upstream
1/1.0/0
Example:
Create a new downstream bonding-group with mac-domain 1
and group ID 1:
Where:
<mac-id> Specifies the MAC domain identifier.
Example:
Display all the bonding groups on domain interface 1:
1 [no] rcc mac <mac_id> rcp-id <rcp_id> <cfg_id> Set up the receive
channel configuration
Where: (RCC) for downstream
<mac_id> MAC domain ID in the range 1 to 32. channel bonding to the
CM.
<rcp_id> Receive channel profile ID in the format
xx:xx:xx:xx:xx To remove a receive
rcc cfg id in the range 1 to 4294967295. channel, use the no form
<cfg_id>
of the command.
Example:
Set up rcc 1 with mac-domain 1:
1 [no] rcc mac <mac_id> rcp-id <rcp_id> <cfg_id> Set up receive channel
configuration (RCC) for
Where: downstream channel
<mac_id> MAC domain ID. Value Range: 1-32 bonding to the CM.
Example:
Example:
Assign receive module 1 at frequency 549000000 to rcc 1:
1 [no] rcc mac <mac_id> rcp-id <rcp_id> <cfg_id> Set up receive channel
configuration (RCC) for
Where: downstream channel
<mac_id> MAC domain ID in the range 1 to 32. bonding to the CM.
xx:xx:xx:xx:xx
<cfg_id> rcc cfg id. Value Range: 1-4294967295.
Example:
Set up rcc 1 with mac-domain 1:
Example:
Assign downstream 1 of rm 1 to rcc 1 as a primary channel:
1 show rcc [mac <mac_id> [rcp-id <rcp_id> <cfg_id>]] Display the receive
channel configuration.
Where:
<mac_id> MAC domain ID in the range 1 to 32.
<rcp_id> Receive channel profile id, in form of
xx:xx:xx:xx:xx
<cfg_id> rcc cfg id in the range 1 to 4294967295.
Example:
Show the RCC on MAC domain 1:
NOTE: Casa strongly recommends that users create modulation profiles automatically with the
provided tools. Modulation profiles created this way are more likely to work effectively. Of course,
users are free to modify any values in an auto-created profile based on field conditions. Automatic
creation of modulation profiles are described in the following subsections.
Example:
CASA-CMTS(config)#modulation profile 22 tdma qpsk
CASA-CMTS(config-mod-prof)#
Example:
CASA-CMTS(config)#modulation-profile 22
CASA-CMTS(config-mod-prof)#
2 <iuc> tdma <mod-type> <diff-encoding> <preamble-len> <fec- Specify the
t> <fec-k> <scramble-seed> <bust-size> <guard-time> <cw- profile parameter
len> <scramble-mode> values.
Where:
Example:
See below.
Configuring modulation-profile 6
CASA-CMTS# config
CASA-CMTS(config)# modulation-profile 6
CASA-CMTS(config-mod-prof)# request tdma qpsk off 64 0 16 338 1 8 fixed on
CASA-CMTS(config-mod-prof)# initial tdma qpsk off 128 5 34 338 0 48 fixed on
CASA-CMTS(config-mod-prof)# station tdma qpsk off 128 5 34 338 0 48 fixed on
CASA-CMTS(config-mod-prof)# short tdma qpsk off 72 6 75 338 6 8 fixed on
CASA-CMTS(config-mod-prof)# long tdma qpsk off 80 8 220 338 0 8 fixed on
CASA-CMTS(config-mod-prof)# end
CASA-CMTS(config)#
Example:
CASA-CMTS(config)#modulation profile 22 atdma qpsk
CASA-CMTS(config-mod-prof)#
Note: The specified modulation type applies only to the burst types a-short and a-long.
Example:
CASA-CMTS(config)#modulation profile 22
CASA-CMTS(config-mod-prof)#
2 <iuc> atdma <mod-type> <diff-encoding> <preamble-len> Specify the
<fec-t> <fec-k> <scramble-seed> <bust-size> <guard-time> profile parameter
<cw-len> <scramble-mode> <intlv-depth> <intlv-block> values.
<preamble-type>
Where:
Configure modulation-profile 7
CASA-CMTS# config
CASA-CMTS(config)# modulation-profile 7
CASA-CMTS(config-mod-prof)# request atdma qpsk off 64 0 16 338 1 8 fixed on 1
1536 qpsk0
CASA-CMTS(config-mod-prof)# initial atdma qpsk off 128 5 34 338 0 48 fixed on 1
1536 qpsk0
CASA-CMTS(config-mod-prof)# station atdma qpsk off 128 5 34 338 0 48 fixed on 1
1536 qpsk0
CASA-CMTS(config-mod-prof)# a-shot atdma 16qam off 72 6 75 338 6 8 fixed on 1
1536 qpsk0
CASA-CMTS(config-mod-prof)# a-long atdma 16qam off 80 8 220 338 0 8 fixed on 1
1536 qpsk0
CASA-CMTS(config-mod-prof)# end
CASA-CMTS(config)#
Note: MTDMA does not support the 6.4MHz US channel width. TDMA supports DOCSIS 1.0/1.1
with a channel width limit of 3.2MHz. If you attempt to set a US channel that has a channel width
of 6.4.MHz to the MTDMA profile, you will receive an error message notifying you that there is a
conflict between the channel width and the modulation profile. Use the auto-mode ATDMA-type
modulation profile configuration to specify the modulation type only; the remaining attributes will
be automatically set to those predefined in modulation-profile 3.
Example:
CASA-CMTS(config)#modulation-profile 22 mtdma qpsk
CASA-CMTS(config-mod-prof)#
Note: The specified modulation type applies to the profile in following way:
Example:
CASA-CMTS(config)#modulation-profile 22
CASA-CMTS(config-mod-prof)#
2 <iuc> mtdma <mod-type> <diff-encoding> <preamble-len> Specify the
<fec-t> <fec-k> <scramble-seed> <bust-size> <guard-time> profile parameter
<cw-len> <scramble-mode> <intlv-depth> <intlv-block> values.
<preamble-type>
Where:
<iuc> request, initial, station, a-short, a-long
<mod-type> qpsk,16qam, 8qam, 32qam, 64qam
<diff-encoding> on, off
<preamble-len> 1-1536 (bits)
<fec-t> = T 0-16
<fec-k> = k 0, 16-253
<scrambler-seed> 15-bit seed
<max-burst-size> 0-255 (mini-slots)
<guard-time> 4-255 (modulation intervals)
<code-word-len> fixed, shortened
<scrambler-mode> on, off
<intlv-depth> 0 to [2048/(k+2T)]
<intlv-block> 2*(k+2T) to 2048
<preamble-type> qpsk0, qpsk1
Example:
See below.
Configuring modulation-profile 8
CASA-CMTS# config
CASA-CMTS(config)# modulation-profile 8
CASA-CMTS(config-mod-prof)# request mtdma qpsk off 64 0 16 338 1 8 fixed on 1
1536 qpsk0
CASA-CMTS(config-mod-prof)# initial mtdma qpsk off 128 5 34 338 0 48 fixed on 1
1536 qpsk0
CASA-CMTS(config-mod-prof)# station mtdma qpsk off 128 5 34 338 0 48 fixed on 1
1536 qpsk0
CASA-CMTS(config-mod-prof)# shot mtdma 16qam off 72 6 75 338 6 8 fixed on 1
1536 qpsk0
CASA-CMTS(config-mod-prof)# long mtdma 16qam off 80 8 220 338 0 8 fixed on 1
1536 qpsk0
CASA-CMTS(config-mod-prof)# a-shot mtdma 16qam off 72 6 75 338 6 8 fixed on 1
1536 qpsk0
CASA-CMTS(config-mod-prof)# a-long mtdma 16qam off 80 8 220 338 0 8 fixed on 1
1536 qpsk0
CASA-CMTS(config-mod-prof)# end
Casa CMTS Software Configuration Guide 377
CASA CMTS
CASA-CMTS(config)#
Example:
CASA-CMTS(config)#modulation-profile 22 scdma
qpsk
CASA-CMTS(config-mod-prof)#
Note: The specified modulation type applies only to the burst types a-short and a-long.
Example:
See below.
modulation-profile 2
request tdma qpsk off 64 0 16 338 0 16 fixed on
initial tdma qpsk off 640 5 34 338 0 48 fixed on
station tdma qpsk off 384 5 34 338 0 48 fixed on
short tdma 16qam off 168 6 75 338 7 8 shortened on
long tdma 16qam off 192 8 220 338 0 8 shortened on
modulation-profile 3
request atdma qpsk off 64 0 16 338 0 16 fixed on 1 1536 qpsk0
initial atdma qpsk off 640 5 34 338 0 48 fixed on 1 1536 qpsk0
station atdma qpsk off 384 5 34 338 0 48 fixed on 1 1536 qpsk0
a-short atdma 64qam off 104 12 75 338 6 8 shortened on 1 1536 qpsk1
a-long atdma 64qam off 104 16 220 338 0 8 shortened on 1 1536 qpsk1
modulation-profile 4
request mtdma qpsk off 64 0 16 338 0 16 fixed on 1 1536 qpsk0
initial mtdma qpsk off 640 5 34 338 0 48 fixed on 1 1536 qpsk0
station mtdma qpsk off 384 5 34 338 0 48 fixed on 1 1536 qpsk0
short mtdma 16qam off 168 6 75 338 7 8 shortened on 1 1536 qpsk1
long mtdma 16qam off 192 8 220 338 0 8 shortened on 1 1536 qpsk1
a-short mtdma 64qam off 104 12 75 338 6 8 shortened on 1 1536 qpsk1
a-long mtdma 64qam off 104 16 220 338 0 8 shortened on 1 1536 qpsk1
modulation-profile 5
request scdma qpsk off 64 0 16 338 1 0 fixed on qpsk0 on 2 1 off
initial scdma qpsk off 640 5 34 338 0 0 fixed on qpsk0 off 2 1 off
station scdma qpsk off 512 5 34 338 0 0 fixed on qpsk0 off 2 1 off
a-short scdma 128qam off 64 5 33 338 12 0 shortened on qpsk0 on 128 1 on
a-long scdma 128qam off 64 10 156 338 0 0 shortened on qpsk0 on 128 1 on
Example:
CASA-CMTS(config)# no modulation-profile 7
CASA-CMTS(config)#
This section describes the commands for Multicast configuration. The commands are organized
in 4 groups:
Example:
CASA-CMTS(config)# multicast authorization profile my-profile
Example:
CASA-CMTS(config)# multicast authorization enable
To disable multicast authorization, use the following procedure. The default setting for multicast
authorization is disabled.
Example:
CASA-CMTS(config)# multicast authorization profile
my-profile
Example:
CASA-CMTS(config)# multicast authorization
profile my-profile
CASA-CMTS(conf-auth-profile my-profile)#
Where:
<rule-id> Identifier for each CMTS configured
Multicast Authorization Profile Session
rule within a Multicast Authorization
Profile Name. Values are 1 to
4294967295.
<accept | deny> Indicates whether the rule permits a
matching multicast join request to be
allowed or denied.
[ipv6] Set multicast IPv6 mode.
<sourceAddr/mask Identifies a range of source IP
_len> addresses. mask_len value are 0 for
ASM based sessions, 0 to 32 for IPv4,
and 1 to 128 for IPv6.
<groupAddr/mask_ Identifies a range of multicast group IP
len> addresses. mask_len value are 0 to 32
for ipv4, and 1 to 128 for ipv6.
<num> Priority number of a session rule.
Higher value indicates a higher priority.
If more than one session rule matches
a joined session, the session rule with
the highest rule priority determines the
authorization action. Values are 0 to
255.
Example:
CASA-CMTS(conf-auth-profile my-profile)# session-
rule 1 accept 192.168.2.1/24 224.0.100.1/24
priority 1
Casa CMTS Software Configuration Guide 383
CASA CMTS
If a multicast join request matches this rule, the request is accepted and the session is
established.
If the accept is changed to deny, then the request would be denied.
If more than one rule matches the join request, the rule with the highest priority is used.
If a mask_len of zero is configured for the source address, then requests with any source
address will match this rule.
If no rules match the multicast join request, the request will take the default setting of either
accept or deny.
Example:
CASA-CMTS(config)# multicast authorization
default-action permit
Example:
CASA-CMTS(config)# multicast authorization max-
session-num 5
Example:
CASA-CMTS(config)# multicast authorization match-
profile my-profile1
CASA-CMTS(config)# multicast authorization match-
profile my-profile2
Example:
CASA-CMTS(config)# multicast group config 1
CASA-CMTS(conf-grp-config 1)#
2 source-address <sourceAddr/mask_len> Configure the
group-address <groupAddr/mask_len> table entries.
tos-low <tos_low_number>
tos-high <tos_high_number>
tos-mask <tos_mask_number>
qos-id <gos_id>
priority <level>
encryption-id <encryption_id_number>
phs-id <phs_id_number_>
Where:
<sourceAddr/mask_len> Identifies a range of source IP
addresses. The mask_len value is 0
for ASM-based sessions, 0 to 32 for
IPv4, and 1 to 128 for IPv6.
<groupAddr/mask_len> Identifies a range of multicast group
IP addresses. The mask_len value is
0 to 32 for IPv4, and 1 to 128 for
ipv6.
<tos_low_number> Identifies the low value of a range of
the TOS byte value to be defined in
a packet classifier. Value: 0 to 255.
<tos_high_number> Identifies the high value of a range of
the TOS byte value to be defined in
a packet classifier. Value: 0 to 255.
<tos_mask_number> Identifies the mask value bitwise
AND with a TOS byte value to be
defined in a packet classifier. Value:
0 to 255.
<qos_id> Identifies an instance in
Example:
Specify qos for a multicast session with a specific service class:
65535.
<cmts|aes128|des40|des Defines which encryption
56> algorithm will be used for an SA
referenced by this object.
Example:
CASA-CMTS(config)# multicast group encryption 1
algorithm cmts
Where:
<qos_num> QoS identifier. Value: 1 to 65535.
<service-class-name> Identifies the Service class name
reference for the set of QoS
parameters for this GQC object.
String-length: 1 to 15.
<single> The CMTS creates a unique GCR
and a unique GSF for the session.
If the multicast group qos is
configured to be single, a new
downstream service flow will be
used for each session.
<aggregate> All sessions matching this criterion
are aggregated into the same
GCR. If aggregate is configured,
only one service flow will be used
for all sessions and the max-
sess number will determine the
maximum number of sessions that
will be allowed to use the service
flow.
<max_sess_num> Identifies the maximum number of
sessions that may be aggregated
in an aggregated Service Flow.
This value is ignored in case of a
CGR with QosCtrl set to 'single'.
Value: 0 to 65535. The default
setting is 0.
<app_id> Configures an application identifier
that an operator configures to
Casa CMTS Software Configuration Guide 388
CASA CMTS
Example:
Specify qos for a multicast session with a specific service class:
Example:
CASA-CMTS(config)# cable service class 1
CASA-CMTS(conf-service-class 1)#
2 name <name> Configure the
min-packet-size <min_packet_size> table entries.
min-reserve-rate <min_reserve_rate>
max-concat-burst <max_concat_burst>
max-latency <max_latency>
max-outstanding-bytes-per-sid-cluster <bytes>
max-req-per-sid-cluster <max_req>
max-time-in-sid-cluster <max_time>
max-tot-bytes-req-per-sid-cluster <max_tot>
max-traffic-burst <max_traffic_burst>
max-traffic-rate <max_traffic_rate>
req-trans-policy <req_trans_policy>
required-attr-mask <req_attr-mask>
tos-overwrite <tos_overwrite>
Where:
<name> Service class name associated
with this service class object
instance. String length: 1 to 15.
<min_packet_size> Minimum packet size. Value: 0 to
65535.
<min_reserve_rate> Minimum reserve rate. Value: 0 to
4294967295.
Example:
CASA-CMTS(config)# cable service-class 1
CASA-CMTS(conf-service-class 1)# name
my_srvs_class
CASA-CMTS(conf-service-class 1)# min-packet-size
100
CASA-CMTS(conf-service-class 1)# min-reserve-rate
200
CASA-CMTS(conf-service-class 1)# max-concat-burst
123
CASA-CMTS(conf-service-class 1)# max-latency 112
CASA-CMTS(conf-service-class 1)# max-traffic-
burst 10
CASA-CMTS(conf-service-class 1)# max-traffic-rate
13
Example:
CASA-CMTS(config)# multicast default group-
service-class dgsc1
Example:
CASA-CMTS(config)# cable igmp static-group
224.0.100.100
Example:
CASA-CMTS(config)# cable igmp static-group
224.0.100.100 source 192.168.0.1
CASA-CMTS(conf-igmp-static-group 224.0.100.100)#
2 qam X/Y/Z Specify the
QAM ID for
Where: downstream
<X/Y/Z> QAM ID. binding.
Example:
CASA-CMTS(conf-igmp-static-group 224.0.100.100)# qam
2/0/0
Example:
CASA-CMTS(config)# no cable igmp static-group
224.0.100.100
Example:
CASA-CMTS(config)# no cable igmp static-group
224.0.100.100 source 192.168.0.1
1 [no] cable igmp filter <number> <seconds> Set the number of IGMP
packets to accept within
Where: the specified time
<number> A value in the range 0 to 20 to specify the window.
maximum number of IGMP response
packets to accept from the CM or CPE within Use the no form of the
the specified time window. The default command to revert to the
setting is 4 IGMP packets. default settings.
Example:
CASA-CMTS(config)# cable igmp filter 10 2
For example, to identify multicast session matching group address 230.0.1.0/24 as limited
multicast sessions, define the following configurations:
Casa CMTS Software Configuration Guide 394
CASA CMTS
Example:
CASA-CMTS(config)# cable service-class 1
CASA-CMTS(conf-service-class 1)#
2 name <name> Name the class.
Where:
<name> The service class name.
Example:
CASA-CMTS(conf-service-class 1)# name my_class
3 <direction> Define the
direction.
Where:
<direction> Upstream or downstream.
Example:
CASA-CMTS(conf-service-class 1)# upstream
Example:
CASA-CMTS(conf-service-class 1)#max-traffic-burst
20000000
Example:
To display the service class parameters of all service classes:
Main
{
NetworkAccess 1;
UsServiceFlow
{
UsServiceFlowRef 1;
QosParamSetType 7;
ServiceClassName test; >specify name here
SchedulingType 2;
}
DsServiceFlow
{
DsServiceFlowRef 3;
ServiceClassName test-ds; >specify name here; suppose you have define a service class name test-
ds on cmts.
QosParamSetType 7;
}
MaxCPE 8;
GlobalPrivacyEnable 0;
/* CmMic 1be76c7df4777d078f76a3eb45d650d5; */
/* CmtsMic 6cf3523752bbd5bd627bb05460f1ff27; */
/*EndOfDataMkr*/
/* Pad */
}
CASA-CMTS(config)#cable service-class 2
CASA-CMTS(conf-service-class 2)# name PCMM-DS
CASA-CMTS(conf-service-class 2)# max-traffic-rate 512000
CASA-CMTS(conf-service-class 2)# min-packet-size 0
CASA-CMTS(conf-service-class 2)# req-trans-policy 0x0
CASA-CMTS(conf-service-class 2)# tos-overwrite 0xFF 0x0
CASA-CMTS(conf-service-class 2)# downstream
CASA-CMTS(conf-service-class 2)# app-id 0
CASA-CMTS(conf-service-class 2)#
CASA-CMTS(config)#cable service-class 3
CASA-CMTS(conf-service-class 3)# name DefD3Down
CASA-CMTS(conf-service-class 3)# min-packet-size 0
CASA-CMTS(conf-service-class 3)# req-trans-policy 0x0
Casa CMTS Software Configuration Guide 399
CASA CMTS
Configuring PacketCable
The CASA CMTS supports the latest PacketCable specification from CableLabs. Those
PacketCable features offer an end-to-end solution for traffic that originates or terminates on a
cable network, simplifying the task of providing multimedia services over an infrastructure
composed of disparate networks and media types, and also provides an integrated approach to
end-to-end call signaling, provisioning, quality of service (QoS), security, billing, and network
management.
This section describes the commands for configuring PacketCable. The commands are
organized in 3 groups:
Example:
CASA-CMTS(config)# packetcable
Example:
CASA-CMTS(config)# packetcable elemid 9996
Configuring an IP address
To configure an IP address for the CASA CMTS:
Step Command (config) Purpose
1 [no] packetcable myaddress <ip_addr> Configure an IP
address.
Where:
[no] Sets IP address to default value 0.0.0.0.
<ip_addr> IP address of CMTS in decimal form. Default
is 0.0.0.0.
Example:
CASA-CMTS(config)# packetcable myaddress 1.1.1.1
Example:
CASA-CMTS(config)# packetcable ftp newuser cucu
Example:
CASA-CMTS(config)# packetcable ftp user password
mypswd
Example:
CASA-CMTS(config)# packetcable t0 15
Example:
CASA-CMTS(config)# packetcable t1 10
Example:
CASA-CMTS(config)# packetcable nls cpd
CASA-CMTS(config)# packetcable nls source-
interface loopback 10
CASA-CMTS(config)# packetcable nsl agid 124 key
alpha
Example:
CASA-CMTS(config)# packetcable max normal call 5
Example:
CASA-CMTS(config)# packetcable max emerg call 100
Example:
CASA-CMTS(config)# packetcable inactive call
aging 4 minimum traffic 50
Example:
CASA-CMTS(config)# packetcable multimedia
CASA-CMTS(config)# packetcable multimedia t1 100
Example:
casa-CMTS(config)#pcmm mmversion major 1 minor 10
casa-CMTS(config)#
casa-CMTS(config)#no pcmm mmversion major 1 minor 10
Example:
casa-CMTS(config)#show pcmm gateid 1 clsfy spec
Cable Modem: 0015.f2fe.8d6a
GateID: 0x40002
PCMM gate state: AUTH
Direction: upstream
Type: multicast
PCMM service-flow: 0
PCMM T1 timer: 200s
PCMM T2 timer: 0s
PCMM T3 timer: 60s
PCMM T4 timer: 0s
PCMM classify count: 1
PCMM traffic profile type: 1
PCMM traffic profile: Flow Spec
PCMM envelope type: 1
PCMM Time Usage Limit: 0s
PCMM Time Usage: 0s
PCMM Volume Usage Limit: 0 Kbytes
PCMM Volume Usage: 0 Kbytes
flow times out. Valid values are 0- 200. The policy server:
default is 0 (no timeout).
Example:
CASA-CMTS(config)# cable service-flow active-
timeout 100
Example:
CASA-CMTS(config)# cable dynamic service-flow
primary
Example:
CASA-CMTS(config)# packetcable rks timeout 9
CASA-CMTS(config)# no packetcable rks timeout
Example:
CASA-CMTS(config)# packetcable rks retry 6
CASA-CMTS(config)# no packetcable rks retry
Example:
CASA-CMTS(config)# packetcable rks batchfile
sendmode udp
Disable:
CASA-CMTS(config)# no packetcable rks batchfile
sendmode
Example:
CASA-CMTS(config)# packetcable rks batchfile time
120
Example:
CASA-CMTS(config)# packetcable rks batchfile max
size 4096
Disable:
CASA-CMTS(config)# no packetcable rks batchfile
max size
Example:
CASA-CMTS(config)# packetcable rks batchfile max
msg 10
Disable:
CASA-CMTS(config)# no packetcable rks batchfile
max msg
Casa CMTS Software Configuration Guide 411
CASA CMTS
Example:
CASA-CMTS(config)# packetcable media alive time
10:30
CASA-CMTS(config)# no packetcable media alive
Example:
CASA-CMTS(config)# packetcable max gate 1000
CASA-CMTS(config)# no packetcable max gate
Example:
CASA-CMTS(config)# show packetcable gateid 1
uspec
COPS server
Example: information.
CASA-CMTS(config)# show packetcable cms server
Configuring DSG
The CASA CMTS supports the latest DOCSIS Set-Top Gateway (DSG) specification from
CableLabs. DSG offers substantial support for enhanced DOCSIS implementation in the
Broadband Cable environment.
This section describes the commands of DSG configuration and provides an example at the end
of the section. The commands are organized in 7 groups:
Example:
CASA-CMTS(config)# dsg tunnel 2
CASA-CMTS(conf-dsg-tunnel-2)# end
CASA-CMTS(config)#
Disable:
CASA-CMTS(config)# no dsg tunnel 2
Example:
CASA-CMTS(config)# no dsg tunnel-group 2
Example:
CASA-CMTS(config)# dsg tunnel-group 2
CASA-CMTS(conf-dsg-tunnel-grp 2)#
Disable:
CASA-CMTS(config)# no dsg tunnel 2
2 [no] group <grp_id> Associates the
tunnel with a
Where: tunnel group.
<grp-id> Tunnel-group identifier. Valid values are 1 to
4294967295.
[no] Removes the specified tunnel group
association.
Example:
CASA-CMTS(conf-dsg-tunnel-2)# group 3
Disable:
CASA-CMTS(conf-dsg-tunnel-2)# no group 3
Example:
CASA-CMTS(config)# show dsg tunnel-group 2
channel 1 qam x/y/z rule-priority 20 vendor-
param-id 1 ucid-list 1
channel 2 qam x/y/z rule-priority 30 vendor-
param-id 500 ucid-list 2
Example:
CASA-CMTS(config)# dsg tunnel 2
CASA-CMTS(conf-dsg-tunnel-2)#
CASA-CMTS(conf-dsg-tunnel-id)# end
CASA-CMTS(config)#
To disable:
CASA-CMTS(config)# no dsg tunnel 2
Example:
CASA-CMTS(conf-dsg-tunnel-2)# dst-address
1234.2345.3456
Example:
CASA-CMTS(config)# dsg tunnel 2
CASA-CMTS(conf-dsg-tunnel-2)#
CASA-CMTS(conf-dsg-tunnel-id)# end
CASA-CMTS(config)#
Disable:
CASA-CMTS(config)# no dsg tunnel 2
2 client-list <list_id> Sets the tunnel
with a destination
Where: MAC address.
<list_id> DSG client list identifier. Valid values are 1
to 4294967295.
[no] Removes the client list from the tunnel.
Example:
CASA-CMTS(conf-dsg-tunnel-2)# client-list 123
Disable:
CASA-CMTS(conf-dsg-tunnel-2)# no client-list 123
Example:
CASA-CMTS(config)# dsg tunnel 2
CASA-CMTS(conf-dsg-tunnel-2)#
CASA-CMTS(conf-dsg-tunnel-id)# end
CASA-CMTS(config)#
To disable:
CASA-CMTS(config)# no dsg tunnel 2
2 [no] service-class <string> Set the service
class to the
Where: tunnel.
<string> Service-class name. The max number of the
string of service-class name is 16.
[no] Removes the client list from the tunnel.
Example:
CASA-CMTS(conf-dsg-tunnel-2)# service-class
private-class
Disable:
CASA-CMTS(conf-dsg-tunnel-2)# no service-class
private-class
Example:
CASA-CMTS(config)# dsg tunnel 2
CASA-CMTS(conf-dsg-tunnel-2)#
CASA-CMTS(conf-dsg-tunnel-id)# end
CASA-CMTS(config)#
Where:
<classifier_id> Classifier identifier. Valid values are 1 to
65535.
<priority> Classifier priority. Valid values are 1 to
255.
[ipv6] Set to ipv6 mode
Example:
CASA-CMTS(conf-dsg-tunnel-2)# classifier 1 20
192.168.0.1/24 224.0.0.100 indcd 6666 6667
CASA-CMTS(conf-dsg-tunnel-2)# no classifier 1 20
192.168.0.1/24 224.0.0.100 indcd 6666 6667
4294967295.
Example:
CASA-CMTS(config)# show dsg tunnel 2
client-list 123
service-class private-class
classifier 1 20 192.168.0.1/24 224.0.0.100 indcd
Example:
CASA-CMTS# show cable dsg tunnel 1 cfrs
cfr cfr cfr destination ip source ip
srcPre d_port d_port
id state pri address address
length start end
Example:
CASA-CMTS(config)# no dsg tunnel-group 2
Where: tunnel-group.
<ch_id> User defined channel identity ranges from
1 to 4294967295. Use the no form
of the command
<level> Rule priority level ranges from 0 to 255 to remove the
with 255 the highest priority. association.
<vnd_id> DSG vendor parameter group identifier.
Valid values are 1 to 4294967295.
<ucid_list> List of upstream channel IDs from which the
rule applies. Values are 1 to 255.
[no] Removes the association.
Example:
CASA-CMTS(conf-dsg-tunnel-grp-2)# channel 1 qam
x/y/z rule-priority 20 vendor-param-id 1 ucid-
list 1
CASA-CMTS(conf-dsg-tunnel-grp-2)# no channel 1
Example:
CASA-CMTS(config)#show dsg downstream dcd
ds dcd dcd num of dcd num of dcd
num of
i/f state Tx sent change cnt
fragment
0/1/0 dis off 0 0 0
0/1/1 dis off 0 0 0
0/1/2 dis off 0 0 0
0/1/3 dis off 0 0 0
Example:
CASA-CMTS(config)#show dsg downstream 1 tunnel 1
Example:
CASA-CMTS(config)# interface qam 0/1
2 [no] channel <ch_id> dsg timer-id <tmr_id> Set the DSG
timer.
Where:
<ch_id> Downstream channel ID, 0 to 3.
<tmr_id > DSG timer ID, 1 to 4294967295.
[no] Removes a DSG timer from a
downstream channel.
Example:
CASA-CMTS(conf-qam 0/1)# channel 0 dsg timer-id 1
Example:
CASA-CMTS(config)# interface qam 0/1
vendor-
Where: parameter ID.
<ch_id> Downstream channel ID, 0 to 3.
Use the no
<vnd_id > DSG vendor-param ID, 1 to form of the
4294967295. command to
remove the
Example: assignment.
CASA-CMTS(conf-qam 0/1)# channel 0 dsg vendor-
param-id 2
Example:
CASA-CMTS(config)# interface qam 0/1
Example:
CASA-CMTS(config)# interface qam 0/1
2 [no] channel <ch_id> dsg dcd-enable Enable or
disable DSG
Where: DCD ENABLE.
<ch_id> Downstream channel ID; 0 to 3.
Example:
CASA-CMTS(conf-qam 0/1)# channel 0 dsg dcd-enable
To disable:
CASA-CMTS(conf-qam-id)# no channel 0 dsg dcd-
enable
Example:
CASA-CMTS(config)# interface qam 0/1
Example:
CASA-CMTS(conf-qam 0/1)# channel 0 dsg interval 5
Remove:
CASA-CMTS(conf-qam 0/1)# no channel 0 dsg interval 5
Example:
CASA-CMTS(config)#show interface qam 2/0
Example:
CASA-CMTS(config)# dsg client-list 1 client 1 id-
type broadcast id-value 2048 vendor-param-id 2
Example:
CASA-CMTS(config)# show dsg client-list 1
dsg client-list 1 client 1 id-type broadcast id-
value 2048 vendor-param-id 2
Example:
CASA-CMTS(config)# dsg vendor-param-id 1 vendor 1
oui 01:02:03 value abc
Example:
CASA-CMTS(config)# show dsg vendor-param- 1
dsg vendor-param-id 1 vendor 1 oui 01:02:03 value
abc
Example:
CASA-CMTS(config)# dsg channel-list 1 channel 1
frequency 526000000
Example:
CASA-CMTS(config)# show dsg channel-list 1
dsg channel-list 1 channel 1 frequency 526000000
Example:
CASA-CMTS(config)# dsg timer-id 1 t1 20 t2 30 t3
40 t4 50
Example:
CASA-CMTS(config)#show dsg timer 1
dsg timer-id 1 t1 20 t2 30 t3 40 t4 50
Example:
CASA-CMTS(config)# dsg unicast-port 1
To show multicast replication in general (DSG replication will be shown as well, if configured):
Example:
To set the shared-secret for non-encrypted messages or
encrypted messages:
CASA-CMTS(config)# shared-secret 0 DOCSIS
To set share-secret MIC for the extend TLVs received from Reg-
Req message:
CASA-CMTS(config)# shared-secret DOCSIS extend
Example:
To set the shared-secondary-secret for non-encrypted messages
or encrypted messages:
CASA-CMTS(config)# shared-secondary-secret 1 0
DOCSIS
Example:
Add a manufacturer CA certificate to the CMTS list of trusted
certificates:
CASA-CMTS(config)# cable privacy add-certificate
manufacturer
35c146353431a541463b41337343938333373142
FEF03A8BC7A441313134749A0A592C9C66831412
BPI+ is required on all DOCSIS 1.1 (and later) compliant cable modems. Earlier cable modems
use BPI.
bpi-enforce Enforces BPI-authenticated cable modem and prohibits traffic for non-BPI
authenticated cable modems. Data is not forwarded before a BPI-enabled cable modem
completes BPI initialization.
bpi-plus-enforce Enforces BPI-plus for DOCSIS 1.1 or later cable modems. When
enabled, cable modems running DOCSIS 1.1 or higher that are not running BPI-plus are
rejected.
Example:
Add the CM certificate with the MAC address of 00C0.8345.de51
to the hotlist, so that this particular CM cannot register with the
CMTS:
Example:
CASA-CMTS(config)# cable sec encrypt-alg-priority
aes128CbcMode des40CbcMode des56CbcMode
Example:
CASA-CMTS(config)# cable sec cert-revocation-
method crl
Example:
CASA-CMTS(config)# cable sec cert-revocation-list
url http://www.cert.com
Example:
CASA-CMTS(config)# cable sec ocsp protocol-url
http://www.ocsp.net
Where:
<group_name> SAV group name. String length is 1 to 32
characters.
<rule_id> Rule ID in the range 1 to 4,294,967,295.
<ipv4_addr> Version 4 IP address in the format
xxx.xxx.xxx.xxx/mask_len
<ipv6_addr> Version 6 IP address in the format
xxxx:xxx:..:xxx/mask_len
Example:
CASA-CMTS(config)# cable sec sav-cfg-list
OneSubNet 1 10.150.3.1/24
Example:
Example:
CASA-CMTS(config)# cable sec tftp-option both
learning status.
Example:
CASA-CMTS(config)# show cable sec config-file-
learning
no cable sec config-file-learning
Main
{
NetworkAccess 1;
VendorSpecific
{
VendorIdentifier 0xffffff;
GenericTLV TlvCode 7 TlvLength 8 TlvValue
0x01066d65726c696e;
}
MaxCPE 16;
UsServiceFlow
{
UsServiceFlowRef 1;
QosParamSetType 7;
SchedulingType 2;
}
DsServiceFlow
{
DsServiceFlowRef 2;
QosParamSetType 7;
}
/* CmMic 49b9d8d459f9a9119f43188372a00422; */
/* CmtsMic 0dc1e7ce52cb806a57f13d9eea9c4db8; */
/*EndOfDataMkr*/
)
In the config file above, the TLV value for SAV Group Name Subtype is merlin (in hex format:
6d65726c696e). When the CM registers with the CMTS, the CMTS will note the SAV for the CM.
The CMTS must be configured as:
192.168.7.77 is the static IP used by the CPE. The 32-bit mask specifies only this IP. Use a
mask to allow a contiguous range of IP addresses. The number 1 after the merlin string is the
SAV Group Name Subtype.
By default the dhcp-authorization is enabled. Unauthorized IP addresses are not allowed. The
cable modem security configuration will allow authorized IPs behind a given CM. By default, cab
sec sav-auth-enable command is enabled.
To authorize an individual MAC address without changing the modem config file, use the
following command:
Example:
CASA-CMTS(config)# cable sec eae-exclusion 1
0015.f2fe.c904
To authorize an IP address or IP subnet (specified in SAV config list) for a specified CM:
Step Command (config) Purpose
1 [no] cable host authorization <mac_addr> <string> Authorize an IP
address or IP
Where: subnet (specified
<mac_addr> CPE MAC address in the format: in SAV config
xxxx.xxxx.xxxx list) for a
specified CM.
<string> SAV config list name.
Example:
CASA-CMTS(config)#cable sec sav-cfg-list host1 1
192.168.9.0/24
Leasequery
Use the DHCP leasequery command to configure the Casa CMTS to send DHCP lease query
requests to the DHCP server. Ensure that the dhcp-authorization parameter on the docsis-mac
interface is currently enabled (default). Since leasequery uses the dhcp.conf file at the DHCP
server, do not set an IP address on CPE/PC devices. The TCP/IP properties on these devices
must be set so that IP addresses are obtained automatically from the dhcpd.conf host setting.
At the DHCP server, you will need to modify the dhcp.conf as follows:
/etc/dhcpd.conf
allow leasequery; <---- Enables dhcp lease query on the DHCP server
host cpe_lab {
hardware ethernet 00:14:22:fa:87:19; <----MAC address of cpe/pc
fixed-address 10.10.9.202; <----Note this must not be a host IP in the
IP bundle range
option routers 10.10.9.1; <----IP secondary address gateway from the
IP bundle setting
}
This allows IP addresses of the CPE to be verified. The DHCP server will return an
acknowledgement message that contains the MAC address of the CPE assigned to this IP
address, if there is one. This function will not interfere with valid RF traffic while it prevents users
from assigning unauthorized IP addresses to CPE.
The default configuration for these commands is off. DHCP authorization must also
be enabled in the MAC domain for lease queries to be sent.
If dhcpv6 leasequery is set, a leasequery will be sent to the DHCP server when a
packet with a source IPv6 address (that is not present in the ARP and local DHCPv6
CPE lease table) is received.
If dhcpv6 leasequery enforce is set, a leasequery will be sent when a packet with a
source IPv6 address (that is not present in the ARP table) is received.
The messages returned from the server have the following default values:
30 query
31 - unassigned
32 unknown
33 active
Press the tab key to get 1-query and enter a value (up to 2 digits) for the message type and a
space. Tab over on the same command line to get 1-unassigned and type up a value (up to two
digits) and a space. Repeat for 1-unknown and 1-active.
Spectrum management
Casa Spectrum Management (CSM) allows the Casa CMTS to monitor the quality of upstream
paths and automatically perform correcting actions when upstream plant impairments are
detected. The monitored upstream plant impairments include Signal to Noise Ratio (SNR),
correctable FECs, and uncorrectable FECs. The automatic corrections include frequency
hopping, upstream channel-width adjustment, and dynamic upstream modulation profile changes.
CSM also provides a means to report the configurations, actions, and some test facilities.
Casa CMTS Software Configuration Guide 448
CASA CMTS
This section describes briefly the algorithm of CSM, and then the operation commands.
CSM algorithm
Casa Spectrum manager uses the Fast Fourier Transform (FFT) technique to monitor signal
quality on the return path. The FFT screening results, SNR and FEC errors in particular, are the
main error events monitored to determine whether plant noise exists and corrective actions are
necessary. Corrective action(s) can be one, two or all three of: frequency hopping, channel width
adjustment, and dynamic modulation profile change.
Spectrum manager maintains a list of discrete channel frequencies and/or one or more frequency
bands for each upstream interface as frequency hopping targets. This is called the spectrum
map. CSM scans through the spectrum map to select the cleanest channel. The spectrum map is
updated when a hop is performed. CSM uses spectrum rule to manage the corrective actions. A
spectrum rule consists of a set of thresholds and a sequential list of actions. An action can be
frequency hopping, channel width adjustment, or modulation profile. A FFT procedure is triggered
when a monitored indicator to an upstream interface hits a defined or default threshold.
The actions take place in an order defined by the operator in the action commands. If plant signal
quality is maintained within the thresholds due to one or more actions, the subsequent actions in
a rule will not be performed since it is not necessary.
If the upstream channel signal with corrected modulation and/or adjusted channel width returns to
3 dB above normal, the spectrum manager may roll back the settings to their original channel
width or modulation profile setting. The hop back threshold can also be specified in the CLI.
To activate CSM on specified upstream interfaces, spectrum rules need to be defined and
assigned to upstream interfaces.
Example:
CASA-CMTS(config)# spectrum rule 2
CASA-CMTS(conf-spec-rule 2)#
Example:
CASA-CMTS(config)# spectrum rule 2
CASA-CMTS(conf-spec-rule 2)#
2 end Exit from the
spectrum rule
Example: setting mode.
CASA-CMTS(config-spec-rule 2)# end
CASA-CMTS(config)#
Example:
CASA-CMTS(config)# spectrum rule 2
CASA-CMTS(conf-spec-rule 2)#
Example:
Set two frequency bands, 14-20 and 30-60 MHz, to spectrum rule
2:
CASA-CMTS(conf-spec-rule 2)# frequency band
14000000 20000000
CASA-CMTS(conf-spec-rule 2)# frequency band
30000000 60000000
Where:
<freq> Frequency in Hz.
Example:
CASA-CMTS(conf-spec-rule 2)# frequency 34000000
Note: After the spectrum rule is assigned to an upstream interface, the discrete frequency
becomes a frequency band with the same width as that of the upstream interface
or priority.
action frequency channel-width modulation
Example:
CASA-CMTS(conf-spec-rule 2)#
action modulation frequency channel-width
Note: Frequency hopping will not occur if no frequency band is specified to a spectrum rule.
Modulation profile change will not occur if the no secondary profile defined in the upstream.
Channel-width adjustment will not occur if no channel width range specified.
Example:
CASA-CMTS(conf-spec-rule 2)# channel-width 3200000
1600000
Note: If the specified start-width is larger than current effective width, channel-width change
starts from start-width. Otherwise, the change starts with current effective width.
To return the channel width to its default setting of 1,600,000 Hz for a specified spectrum rule,
enter the following command:
spectrum
Where: rule or enter
<id> Spectrum rule ID number. Valid values are 1 to 40. spectrum
rule setting
mode.
Example:
CASA-CMTS(config)# spectrum rule 2
CASA-CMTS(conf-spec-rule 2)#
2 [no] profile <id> snr-threshold <tenth-dB> Specify a
modulation
Where: profile SNR
<id> Modulation profile ID which can be predefined threshold.
or user defined.
<tenth-dB> SNR threshold number in units of tenth dB.
Example:
Specify profiles 3 and 4 to spectrum rule 2 with SNR 130 and 200:
Note: 0 or more profiles with an SNR threshold can be specified for a spectrum rule.
Casa Spectrum Management (CSM) uses the SNR threshold of a modulation profile for two
purposes:
1. One of the three triggers (SNR, correctable FEC and uncorrectable FEC) for possible
corrective actions.
2. As a reference to evaluate a calculated SNR (based on FFT data) is sufficient for a particular
modulation profile in an effort of corrective or improvement action.
to 40. mode.
Example:
CASA-CMTS(config)# spectrum rule 2
CASA-CMTS(conf-spec-rule 2)#
Example:
CASA-CMTS(conf-spec-rule 2)# profile 3 snr-threshold
0
Example:
CASA-CMTS(conf-spec-rule 2)# correctable-fec
threshold 5
Example:
CASA-CMTS(config)# spectrum rule 2
CASA-CMTS(conf-spec-rule 2)#
Example:
CASA-CMTS(conf-spec-rule 2)# uncorrectable-fec
threshold 0
Example:
CASA-CMTS(config)# interface upstream 1/2
2 spectrum-rule <id> Assign a
spectrum
Where: rule to an
<id> Spectrum rule ID (1 40) upstream
interface.
Example:
CASA-CMTS(config-if-ups 1/2)# spectrum-rule 2
With a spectrum rule assigned to an upstream interface, the actions defined in the rule will take
place in the specified (or default) order of priority if:
Plant noise level exceeds SNR threshold defined explicitly in the commands or by default
Percentage of correctable FEC errors of total packets received on the upstream (during
polling period) exceeds the defined or default threshold
Percentage of un-correctable FEC errors of total packets received on the upstream (during
polling period) exceeds the defined or default threshold
A rule can be assigned to any number of upstream interfaces. However, only one rule assignment
per upstream interface is allowed.
Example:
CASA-CMTS(config)# interface upstream
Example:
Assign primary profile 1 and secondary profile 5 to upstream interface
1/2:
CASA-CMTS(config-if-ups 1/2)# logical-channel 0
profile 1 secondary-profile 5
Note: Both profiles have to match the upstream channel type. CSM will not change to a
mismatched profile. The secondary profile has to be less bandwidth-efficient than the primary
one. When plant signal quality deterioration causes any one of the (correctable-FEC,
uncorrectable-FEC of profile P) thresholds hits, CSM changes modulation profile to S (show
running-config will show transit config as logical-channel id profile S secondary-profile S).
When signal quality (calculated SNR, based on FFT) satisfies profile Ps SNR (or default SNR
threshold for profile Ps modulation type, if SNR threshold for profile P is not defined in the rule)
plus 3dB, CSM changes modulation profile back to P.
Where:
Example:
Set monitoring polling-period to 100 seconds:
CASA-CMTS(config)# cable monitor-period 100
Example:
CASA-CMTS(config)# show spectrum-map upstream 1/2
Spectrum Map for interface 1 /2.0
band 0: [18000000, 20000000] ...narrower than
current chan-width 3200000
band 1: [22000000, 25400000]
band 2: [28600000, 40000000]
band 3: [58400000, 61600000]
Example:
Display spectrum noise levels for upstream interface 2/0:
30600000: 6.0
37000000: 7.0
43400000: 17.2
49800000: 9.5
56200000: 9.5
62600000: 6.0
Enabling CM hopping
When multiple logical channels are configured with different modulation profiles in an upstream
physical channel and a cm-hop command is issued, a cable modem can be moved among the
channels based on specified thresholds. If the thresholds specified are exceeded for the cable
modem, it will move to the next (more reliable) logical channel.
Example:
CASA-CMTS(config)# spectrum rule 1
CASA-CMTS(conf-rule 1)#
2 [no] cm-hop Enable or
disable CM
Example: hopping.
CASA-CMTS(conf-rule 1)# correctablefec threshold 5
CASA-CMTS(conf-rule 1)# uncorrectablefec threshold
3
CASA-CMTS(conf-rule 1)# cm-hop
CASA-CMTS(conf-rule 1)# interface ups 1/0
Example:
CASA-CMTS(config)# spectrum rule 1
CASA-CMTS(conf-rule 1)#
2 show cm-hop log Show or
There is no to hop to avoid the noise. The three bands (0-2) are too narrow to escape the noise.
When CSM tries a hop (frequency, modulation, or channel width), it checks if the calculated SNR
at the destination (new freq, etc.) is good enough to accommodate the SNR threshold (280, in
this case). If so, hopping is performed. Otherwise, it tries the next action. In this example, there
is no other action.
However, if the 8/4 frequency is moved to 45MHz (away from 25+1.6=26.6MHz) to give channel
8/1 more room, as in,
spectrum rule 2
frequency band 26000000 42000000
action frequency
then move channel 8/1 back to 30MHz (resetting the CSM state machine at channel 8/1), and
then apply the rule 2 to upstream 8/1, to acquire:
When the CSM poll reaches a threshold, the channel hops to freq 27.6MHz, as indicated by the
following debug message:
Example:
CASA-CMTS(config)# show spectrum-meas upstream 2/0
See below.
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F7 4C F8 DA
F7
4C F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4
F2
F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2 F4 F2
F4
F2
See below.
FC 66 FE C0 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52
F6
52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6
52
F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52
F6
52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6
52
F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6
52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6
52
F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 52 F6 .
Load balancing supports multiple methods to achieve greater bandwidth availability. These
include static and dynamic load balancing schemes, inter-line card and intra-line card support,
and in some circumstances, configuration of load balancing groups that entail multiple interfaces,
multiple load balancing policies, and the option to configure multiple additional load balancing
parameters.
Each of the methods can further be operated in two types: static or dynamic.
Static -- Static load balancing is done at ranging request time. When a cable modem sends
its initial ranging request message, the CMTS responds with a ranging response message
that includes either a Downstream Frequency Override or an Upstream Channel ID Override
field that instructs the cable modem which channels it should use.
Dynamic -- This is a form of load balancing in which cable modems are moved among
upstream and downstream channels within the same service group after their initial difference
between two interfaces exceeds a user-defined percentage. The CMTS will use DCC/UCC
messages to move CMs with single upstream/downstream channels and DBC (dynamic
bonding change) messages to move CMs with bonding upstream/downstream channels to
different bonding groups.
For DOCSIS and EuroDOCSIS 3.0 modems, the dynamic load-balancing software generates
a downstream channel set with a minimum load to fit the modems RCP. This prevents
rejection of the new channel set so that load balancing is not canceled when the assigned
modem is under load.
The Casa CMTS supports both methods and types to load balance upstream and downstream
channels. You can configure a Casa CMTS using static load balancing only, or using static load
balancing and dynamic load balancing together.
Because load balancing can only be done to upstream and downstream interfaces sharing the
same physical connectivity, the upstream and downstream interfaces have to belong to the same
service group.
Both channel bonding and non-channel bonding modems can participate in load balancing.
Channel bonding modems will count as one CM for each of its channels.
To configure load balancing, first define the MAC domains and the service groups. Then define
the basic rules and/or the execution rules. Next, define the load balancing policy and assign the
rules to the policy. Finally, apply the policy to a load balancing group, either the default group or
a restricted load balance group.
To apply a load balancing policy globally, apply it to the default group. To apply different load
balancing policies to different MAC Domain/Service Groups, first define the rules and the policies.
Then create a restricted load balance group, and assign it to the MAC Domain/Service group.
Exclusion lists
Add a CM into exclusion list
Remove a CM from exclusion list
By default, the upstream channel has precedence in load balancing across MAC domains, where
the lowest loaded (least busy) upstream channel is selected within the service group. Then, the
lowest loaded downstream channel is selected within the MAC domain of the selected upstream
channel. If the downstream precedence is configured, then the downstream channel is selected
first.
The CMTS will use downstream frequency override and the upstream channel ID override in the
ranging response message to move modems to a different MAC domain if needed. This applies
to all DOCSIS 1.0, 1.1, 2.0 and 3.0 modems. The SID in the ranging response message is 0x3fff.
Example: mode.
CASA-CMTS(config)# load-balance general-group
default-settings
CASA-CMTS(load-bal-general-default)#
To enter the general load balance group to configure load balancing settings:
Step Command (config) Purpose
1 load-balance general-group mac-domain <num> service-group Enter the
<string> load balance
group.
Where:
<num> MAC domain number in the range 1 to 32.
<string> Service group name.
Example:
CASA-CMTS(config)# load-balance general-group mac-
domain 1 service-group FN_A
CASA-CMTS(load-bal-general-mac-1-sg-FN_A)#
Example:
CASA-CMTS(load-bal-general-default)#initial-tech
broadcast-ranging
Example:
CASA-CMTS(load-bal-general-default)# policy-id 2
Example:
CASA-CMTS(config)# load-balance basic-rule 1
Example:
CASA-CMTS(config)# load-balance basic-rule 1
2 [no] enable Enable or
disable the
Example: basic rule.
CASA-CMTS(load-balance basic-rule 1)# enable
CASA-CMTS(load-balance basic-rule 1)# no enable
Example:
CASA-CMTS(config)# load-balance execution-rule 1
CASA-CMTS(load-bal-exe-rule 1)#
Example:
CASA-CMTS(load-bal-exe-rule 1)# interval 200
Note: If upstream-interval is not configured, interval value will apply to both upstream and
downstream load balance. If upstream-interval is configured, upstream-interval value will apply to
upstream load balance while the interval value will only apply to downstream load balance.
Example:
CASA-CMTS(load-bal-exe-rule 1)# interval 200
Example:
CASA-CMTS(load-bal-exe-rule 1)#
cable modem rebalance-interval 2000
To specify a minimum time interval to move the same modem if previous load-balancing failed for
the modem:
Example:
CASA-CMTS(load-bal-exe-rule 1)# cable modem retry-
interval first 35000 second 87000
If method dynamic is configured, the method will only apply to static load balancing while method
dynamic will apply to dynamic load balance. To disable static load balancing, set the threshold to
0.
Example:
Casa CMTS Software Configuration Guide 478
CASA CMTS
Example:
CASA-CMTS(config)# load-balance execution-rule 5
CASA-CMTS(load-bal-exe-rule 5)#
2 method modem [dynamic] Configure the
method of
Example: modem.
CASA-CMTS(load-bal-exe-rul 5)#method modem
Example:
CASA-CMTS(config)# load-balance execution-rule 5
CASA-CMTS(load-bal-exe-rule 5)#
2 upstream-method utilization [dynamic] Configure the
upstream
Example: method of
CASA-CMTS(load-bal-exe-rul 5)# upstream-method utilization.
utilization
Example:
CASA-CMTS(config)# load-balance execution-rule 5
CASA-CMTS(load-bal-exe-rule 5)#
Example:
CASA-CMTS(config)# load-balance execution-rule 5
CASA-CMTS(load-bal-exe-rule 5)#
Where:
To disable upstream load balancing, set the threshold and enforce values to 0.
Example:
CASA-CMTS(config)# load-balance policy 5
CASA-CMTS(load-bal-policy 5)#
Example:
CASA-CMTS(config)# load-balance policy 5
CASA-CMTS(load-bal-policy 5)#
Example:
CASA-CMTS(load-bal-policy 5)# rule basic 10
Example:
CASA-CMTS(config)# load-balance policy 5
CASA-CMTS(load-bal-policy 5)#
2 [no] rule execution <id> Add or remove
a policy
Where: execution rule.
<id> Load-balance execution rule ID; valid values are 1 to
16.
Example:
CASA-CMTS(load-bal-policy 5)# rule execution 10
Example:
CASA-CMTS(config)# load-balance restricted-group
2
CASA-CMTS(load-bal-restrict-group-2)#
Example:
CASA-CMTS(config)# load-balance restricted-group
2
CASA-CMTS(load-bal-restrict-group-2)#
Example:
CASA-CMTS(load-bal-restrict-2)# docsis-mac 1
Example:
CASA-CMTS(config)# load-balance restricted-group
group-id 2
CASA-CMTS(load-bal-restrict-group-2)#
Example:
CASA-CMTS(load-bal-restrict-group-2)# docsis-mac
1
CASA-CMTS(load-bal-restrict-mac-id-group-1)#
3 [no] enable Enable or disable
the load balance
Example: function.
CASA-CMTS(load-bal-restrict-mac-id-group-1)#
CASA-CMTS(load-bal-restrict-mac-id-group-1)#
enable
Example:
CASA-CMTS(config)# load-balance restricted-group
group-id 2
CASA-CMTS(load-bal-restrict-group-2)#
Example:
CASA-CMTS(load-bal-restrict-group-2)# docsis-mac 1
CASA-CMTS(load-bal-restrict-mac-id-group-1)#
Example:
CASA-CMTS(config)# load-balance restricted-group
group-id 2
CASA-CMTS(load-bal-restrict-group-2)#
Example:
CASA-CMTS(load-bal-restrict-group-2)# docsis-mac
1
CASA-CMTS(load-bal-restrict-mac-id-group-1)#
3 [no] upstream <x/y/z> Add or remove
an upstream
Where: channel on a
<x/y/z> Upstream channel in form of slot/port/logic- restricted group.
channel.
Example:
CASA-CMTS(load-bal-restrict-group-2)# docsis-mac
1
CASA-CMTS(load-bal-restrict-mac-id-group-1)#
3 [no] qam <x/y/z> Add or remove a
downstream
Where: channel on a
<x/y/z> Downstream channel in form of slot/port/logic- restricted group.
channel.
Exclusion lists
Cable modems can be set not to move by putting them into an exclusion list.
Example:
To exclude all modems with MAC address 0014:
Example:
CASA-CMTS(config)# load-balance restricted-cm 1
CASA-CMTS(load-bal-restrict-cm 1)#
Example:
Example:
CASA-CMTS(load-bal-restrict-cm 1)#
Example:
CASA-CMTS(config)# load-balance restricted-cm 1
CASA-CMTS(load-bal-restrict-cm 1)#
Example:
CASA-CMTS(config)# load-balance restricted-cm 1
CASA-CMTS(load-bal-restrict-cm 1)#
Example:
Add restricted group 3:
CASA-CMTS(load-bal-restrict-cm 1)# restricted-
load-balance-group 3
Note: Currently this function is for CMs without channel bonding only. Do not specify the
upstream channel ID here.
Where:
Example:
Move CM 0015.f2fe.c904 to another CMTS:
CASA-CMTS(config)# cable modem 0015.f2fe.c904 dcc
change-frequency 593 initial-tech reinitialize-
mac
Setting the upstream channel frequency difference limit on the DCC when
the initial technique is direct
When this limit is set, if the CMTS needs to move a modem to a new upstream channel with a
frequency difference greater than the set limit during dynamic load balancing, it will use the initial
technique of broadcast-ranging (1) instead of direct (4).
To set the difference limit from 1 MHz to 60MHz (if set to 0, then there is no limit):
Step Command (config) Purpose
1 load-balance general-default Enter general
default.
Example:
CASA-CMTS(config)# load-balance general-default .
CASA-CMTS(load-bal-general-default)#
Example:
CASA-CMTS(load-bal-general-default)# initial-tech
direct frequency-limit 40
Changing a bonded CMs upstream and downstream with the DBC method
To change a bonded CMs upstream and downstream channels via the DBC method:
Step Command (config) Purpose
1 cable modem <mac_addr> dbc [rcp-id <rcp_id> rcc-id <rcc_id>] Change
upstream-list <string> initial-tech (reinitialize-mac | broadcast- bonded CM
ranging | unicast-ranging | period-ranging | direct) upstream
and
Where: downstream
<mac_addr> Modem MAC address in 32-bit hex format. channels with
the DBC
dbc Dynamic bonding change. method.
<rcp_id> Optional RCP ID in the format xx:xx:xx:xx:xx.
<rcc_id> Optional RCC ID in the range 1 to 255.
<string> Name of upstream list in string format.
Example:
See below.
Command ordering
Because many of the load balancing commands depend on the existence of other objects, the
ordering of these commands is critical. For example, load-balance general-group depends on the
existence of mac domain, service group, and policy. And policy depends on basic rule and
execution rule.
In show run, the command described in this document should come after all the interface
configuration commands and follow the order outlined below:
service-group
.
interface docsis-mac 1
.
interface upstream x/y
.
load-balance enable
.
load-balance basic-rule
.
load-balance execution-rule
.
load-balance policy x
.
load-balance general-group default-settings
.
load-balance general-group mac-domain x service-group y
.
load-balance restricted-group group-id y
.
load-balance restricted-cm x
.
bonding-group downstream mac-domain x group-id y
.
bonding-group upstream mac-domain x group-id y
Sample configuration
CASA-CMTS# show run
!
! CASA-CMTS system running configuration
!
hostname "sada"
!
password casa
!
!
interface eth 0
ip address 192.168.2.240 255.255.255.0
!
interface ip-bundle 1
ip address 10.248.1.1 255.255.255.0
cable helper-address 192.168.3.8
!
!
interface gige 0
ip address 192.168.3.48 255.255.255.0
ipv6 address 2001:50:1::3/64
no shutdown
!
interface gige 1
shutdown
!
interface gige 2
shutdown
!
interface gige 3
shutdown
!
!
cable sec tftp-options none
no cable sec config-file-learning
cable sec cert-revocation-list url
cable sec ocsp protocol-url
!
!
interface qam 0/0
interleave 128x1
power 540
channel 0 frequency 669000000
no channel 0 shutdown
channel 1 frequency 675000000
no channel 1 shutdown
channel 2 frequency 681000000
no channel 2 shutdown
channel 3 frequency 687000000
no channel 3 shutdown
no shutdown
interface qam 0/1
interleave 128x1
power 540
channel 0 frequency 549000000
no channel 0 shutdown
channel 1 frequency 555000000
no channel 1 shutdown
channel 2 frequency 561000000
no channel 2 shutdown
channel 3 frequency 567000000
no channel 3 shutdown
no shutdown
no channel 0 shutdown
channel 1 frequency 555000000
no channel 1 shutdown
channel 2 frequency 561000000
no channel 2 shutdown
channel 3 frequency 567000000
no channel 3 shutdown
shutdown
!
igmp client version 2
!
interface docsis-mac 1
no shutdown
no dhcp-authorization
no early-authentication-encryption
no multicast-dsid-forward
no tftp-proxy
ip bundle 1
downstream 1 interface qam 0/0/0
downstream 2 interface qam 0/0/1
downstream 3 interface qam 0/0/2
downstream 4 interface qam 0/0/3
downstream 5 interface qam 0/1/0
downstream 6 interface qam 0/1/1
downstream 7 interface qam 0/1/2
downstream 8 interface qam 0/1/3
upstream 1 interface upstream 1/0/0
upstream 2 interface upstream 1/1/0
upstream 3 interface upstream 1/2/0
upstream 4 interface upstream 1/3/0
!
!
channel-utilization-interval 0
channel-width 3200000
logical-channel 0 profile 2
logical-channel 0 minislot 2
logical-channel 0 pre-equalization
no logical-channel 0 shutdown
logical-channel 1 profile 5
logical-channel 1 frame 16 8 128
no logical-channel 1 shutdown
no shutdown
channel-width 3200000
logical-channel 0 profile 2
logical-channel 0 minislot 2
no logical-channel 0 shutdown
logical-channel 1 profile 2
logical-channel 1 minislot 2
logical-channel 1 shutdown
no shutdown
!
!
! load balance commands
!
load-balance enable
load-balance basic-rule 1
enable
suspend-load-balance from 13:00:00 to 20:00:00
load-balance basic-rule 2
enable
suspend-load-balance from 13:00:00 to 23:00:00
load-balance basic-rule 3
enable
suspend-load-balance from 20:00:00 to 01:00:00
load-balance execution-rule 1
enable
method modem
threshold load 10 enforce 30 minimum 35
load-balance policy 1
Casa CMTS Software Configuration Guide 500
CASA CMTS
rule basic 1
rule basic 3
rule execution 1
load-balance restricted-cm 1
mac addr 0018.0123.5678
service-type-id restict1
restricted-load-balance-group 10
load-balance restricted-cm 2
mac addr 0019.0000.0000 mask ffff.0000.0000
service-type-id restict1
restricted-load-balance-group 10
!
! end of config
!
Casa CMTS Software Configuration Guide 501
CASA CMTS
For cable modems that support channel bonding operation, the Casa CMTS automatically
creates channel bonding groups with channels that belong to the same service group, and the
same docsis-mac interface.
The Casa CMTS supports channel bonding in the same line card module. The maximum number
of downstream channels per QAM module is 16, and the maximum number of upstream channels
per upstream DCU module is 16.
Example:
CASA-CMTS(config)# service group 1
CASA-CMTS(conf-svc-grp 1)#
2 [no] qam <slot/port/channel> Add or remove a
downstream
Where: channel.
<slot/port/channel> Slot, port and channel numbers.
Example:
CASA-CMTS(conf-svc-grp 1)# qam 0/0/0
Remove:
CASA-CMTS(conf-svc-grp 1)#no qam 0/0/0
Example:
CASA-CMTS(conf-svc-grp 1)# upstream ?
X/Y.C X-slot number, Y-port number, C-
physical channel index 0 or 1
Example:
CASA-CMTS(config)# interface docsis-mac 1
CASA-CMTS(conf-if-mac 1)#
2 [no] downstream <chan_id> interface qam Add or remove a
<slot/port/channel> downstream
channel.
Where:
<chan_id> Channel ID.
<slot/port/channel> Slot, port and channel numbers.
Example:
CASA-CMTS(conf-if-mac 1)#downstream 1 interface
qam 0/0/0
Example:
CASA-CMTS(conf-if-mac 1)# upstream 1 interface
upstream ?
CASA-CMTS(conf-if-mac 1)#
Example:
CASA-CMTS(config)# bonding-group downstream mac-
domain 7 group-id 1
CASA-CMTS(bond-ds-mac-7-group-1)#
Example:
CASA-CMTS(config)# bonding-group upstream mac-
domain 7 group-id 1
CASA-CMTS(bond-us-mac-7-group-1)#
Example:
CASA-CMTS(config)# bonding-group upstream mac-
domain 7 group-id 1
CASA-CMTS(bond-us-mac-7-group-1)#
2 prov-attr-mask <mask> Set the
provisioned
Where: attribute mask.
<mask> Provisioned attribute mask in hex format 0x0
to 0xffffffff.
Example:
CASA-CMTS(config)# bonding-group downstream mac-
domain 7 group-id 1
CASA-CMTS(bond-ds-mac-7-group-1)#
2 prov-attr-mask <mask> Set the
provisioned
Where: attribute mask.
<mask> Provisioned attribute mask in hex format 0x0
to 0xffffffff.
Example:
CASA-CMTS(config)# bonding-group upstream mac-
domain 7 group-id 1
CASA-CMTS(bond-us-mac-7-group-1)#
2 [no] upstream <x/y/z> Add or remove
Where: the upstream
<x/y/z> Upstream channel in form of slot/port/logic- channel.
channel.
Example:
CASA-CMTS(config)# bonding-group downstream mac-
domain 7 group-id 1
CASA-CMTS(bond-ds-mac-7-group-1)#
2 [no] qam <x/y/z> Add or remove
the downstream
Where: channel.
<x/y/z> Downstream channel in form of
slot/port/channel.
Example:
CASA-CMTS(config)# bonding-group downstream mac-
domain 7 group-id 1
CASA-CMTS(bond-ds-mac-7-group-1)#
2 reseq wait-time <value> Set the DSID re-
sequencing wait
Where: time.
<value> Re-sequencing waiting time value; 0 to 255.
Example:
CASA-CMTS(config)# bonding-group downstream mac-
domain 7 group-id 1
CASA-CMTS(bond-ds-mac-7-group-1)#
2 reseq warn-threshold <level> Set the DSID
warning
Where: threshold.
<level> Re-sequencing threshold level; 0 to 255.
QoS support
The C10200 and C3200 provide Quality of Service (QoS) through fine grain, per-flow queuing in
the DQM and DCU modules, and class-based strict priority scheduling in the switch fabric and
Gigabit interfaces.
Each packet destined for a downstream interface is assigned a service flow through classification
by the DOCSIS forwarding engine. The packet scheduler in the DQM module supports minimum
guaranteed rate, as well as maximum transmitted rate. Packets are serviced in the order of
priority specified by the service flow. Service flow that is within minimum guaranteed rate is
served first. Within the same priority, round robin is used to schedule between different service
flows.
If the service flow has minimum guaranteed rate, and the current rate is within the specified rate,
the packet is queued in the guaranteed class, which has the highest priority. The packet is
subsequently rate limited through a token bucket to conform to the maximum transmitted rate
specified for the service flow. Packets that exceed the maximum transmitted rate are rate-shaped
by deferring their transmission. Packets are only dropped if the buffer utilization is high and the
buffer usage by the service flow is above the drop threshold.
For downstream channel bonding operation, the service flow is serviced by each of the channels
in the bonding channel set in parallel.
The hierarchical upstream scheduler serves upstream service flows based on priority. Jitter-
sensitive service flows are serviced first, followed by service flows that are within its guaranteed
rate. Best effort service flows are then serviced in the order of priority. Within each priority, the
service flows are serviced by a round robin scheduler.
For best effort services, the minimum guaranteed rate is checked first. If the transmission rate of
the service flow is within its specified guaranteed rate, the request is placed in the guaranteed
queue, which is serviced before other best effort queues. Token bucket is used to rate limit the
service flow within its configured maximum transmission rate and maximum burst size. Requests
that exceed the maximum transmission rate are deferred. Requests that conform to the maximum
transmission rate are placed into the queue determined by the priority of the service flow.
Jitter-sensitive service flows are scheduled by the real-time scheduler. To provide jitter
guarantees, the transmission opportunities are pre-allocated when the service flow is admitted to
prevent overlap. At MAP generation time, the real time scheduler aggregates jitter-sensitive
grants into clusters. The best effort grants are then placed into the gaps between the real time
grant clusters. If the gap is not big enough, the cluster is allowed to move to increase the gap, as
long as jitter guarantees can be met for the real time grants in the cluster. If the gap is still not
enough to place the best effort grant, the best effort grant is then fragmented. The scheduler
keeps track of the remainder of the fragments and continues to serve the fragments until the
request is fulfilled.
For service flows that are serviced by upstream channel bonding, the service flow is inserted into
multiple queues, one for each of the upstream channels in the bonding channel set. The service
flow is serviced by each of the upstream channels until all the outstanding bytes requested are
served.
For packets entering the switch fabric from the DCU module, the priority is determined by the
priority value in the upstream service flow. For packets entering the switch fabric from Gigabit
Ethernet interfaces, the priority is from the 802.1p field if the packet is VLAN-tagged. For
untagged packets, the DSCP value in the IP header is used to determine the priority.
The filtering engine can be used to overwrite the DSCP value using access list. The priority value
can also be modified based on access lists.
To prevent head-of-line blocking, the switch fabric keeps track of the outstanding buffer count and
packet count for each of the ingress ports and each of the classes. When an egress port on the
switch fabric becomes congested, a packet is discarded at ingress if the outstanding buffer count
or packet count from the ingress port exceeds the discard threshold for the class it belongs to.
Configuring QoS
The Casa CMTS supports quality of services (QoS) as defined by the DOCSIS 1.0, 1.1
specifications. Service classes can be configured through the command-line interface to support
the QoS profile number, traffic priority, maximum upstream bandwidth, guaranteed upstream
bandwidth, maximum downstream bandwidth, maximum transmit burst length, baseline privacy
enable/disable, and type of service (ToS) overwrite byte. This section covers commands for the
following operations:
Example:
CASA-CMTS(config)# cable service-class 100
Example:
Show the standard and verbose formats of the show cable service
class command:
CASA-CMTS# show cable service-class
Index: 1
Name: UP_UGS
Direction:
Upstream/Downstream
Traffic Priority: 0
Maximum Sustained Rate: 0
bits/sec
Max Burst: 1522
bytes
Minimum Reserved Rate: 0
bits/sec
Minimum Packet Size 100 bytes
Admitted QoS Timeout 30
seconds
Active QoS Timeout 30
seconds
Scheduling Type:
Unsolicited Grant Service
Request/Transmission Policy: 0x1FF
Unsolicited Grant Size: 100 bytes
Nominal Grant Interval: 20000
usecs
Tolerated Grant Jitter: 4000
usecs
Grants per Interval: 1
IP ToS Overwrite [AND-mask,OR-mask]: 0xE0,0xA0
Max Latency: 0 usecs
Parameter Presence Bitfield: {0xE08,
0xBCC000}
Only 'permit' rules are used for policy/class. A total of 128 ACL rules are supported for policy
service (set DSCP). ACL rules in the access-group take priority if a packet matches in both the
ACL and policy (for DSCP rewrite).
Where:
<policy-name> Policy name.
map information.
Where:
<name> The class or policy name
Example:
CASA-CMTS(config)# interface gige 5
Example:
CASA-CMTS(conf-if-gige 5)#service-policy policy1
CASA-CMTS(conf-if-gige 5)#
Example:
CASA-CMTS(config)# interface docsis-mac 1
CASA-CMTS(conf-if-mac 1)#
Where:
<policy-name> The policy name.
Example:
CASA-CMTS(conf-if-mac 1)# service-policy policy1
CASA-CMTS(conf-if-mac 1)#
Where:
<policy_name> The policy name.
Example:
CASA-CMTS(conf-if-vlan 1)#service-policy policy1
CASA-CMTS(conf-if-vlan 1)#
The command should be run under configuration mode. The configurations are persistent and a
copy running-config to startup-config is not required.
The engineID is expressed as a hexadecimal string (24 characters) in the SNMP configuration.
After configuring or changing the SNMP engineID, you will need to reconfigure any SNMP V3
users, as the keys will based on the prior engineID setting.
Example:
Enable SNMP v2 trap
CASA-CMTS (config)# snmp trap version 2
Where:
<host-ip> Host server IP address in the format a.b.c.d.
<version> Trap version; values are 1 or 2
Example:
Set SNMP trap with host IP address 192.168.6.10, community
string as public, and trap version of 1:
Example:
CASA-CMTS (config)# snmp trap-source loopback 6
Where:
<version> Inform version; values are 2 or 3
Example:
Enable SNMP v2 inform
CASA-CMTS (config)# snmp inform version 2
CASA-CMTS (config)#
Example:
Set SNMP community string to local with read-only privileges.
CASA-CMTS(config)# snmp community local ro
CASA-CMTS(config)# show snmp community
Community name: local
Community Index: local
Community SecurityName: rotesting
Community StorageType: 3
Community Status: active
Where:
<group> group name in string form
Where:
<comm_index>: community table index in string form
<comm_name> : community name in string form
<sec_name>: community security name in string form
<context_id>: context engine ID in string form
<context_name>: context name in string form
<tag>: tag value in string form
other: storage other
volatile: storage volatile
non-volatile: storage non-volatile
permanent: storage permanent
read-only: storage read-only
mod: modify an entry
Example:
CASA-CMTS(config)#snmp notify
InformV2cSNMPv2cNotifyTagList
InformV2cSNMPv2cNotifyTagList inform n
on-volatile
Where:
snmpv1: SNMP version 1
snmpv2c: SNMP version 2c
usm: usm
<sec_name>: Security name in string form
<group_name>: Group name in string form
other: Storage other
volatile: Storage volatile
Casa CMTS Software Configuration Guide 523
CASA CMTS
Example:
CASA-CMTS(config)#snmp security snmpv1 rotesting
rotesting non-volatile
CASA-CMTS(config) show snmp
Where:
<tgt_addr>: Target address in string form
snmpUDPDomain td UDP domain
:
<td_addr>:<port> td address and port in dotted decimal
notation.
<time_out_num>: time-out value
<retry_num>: Number of retries
<tag_list>: Tag list in string form
<param>: Parameters in string form
other: Storage other
volatile: Storage volatile
non-volatile: Storage non-volatile
permanent: Storage permanent
read-only Storage read-only
<mask_value> Mask value in string form
<num> MMS integer range 484 to 65535
Mod Modify an entry
Example:
CASA-CMTS(config)# snmp tgt-addr anywhere
snmpUDPDomain 192.168.8.232:162 500 1
anywhereTag none non-volatile 255.255.0.0:162
500
CASA-CMTS(config) show snmp
Where:
<param>: Target parameter in string form
0 snmpv1 processing
1 snmpv2c processing
3 snmpv3 processing
snmpv1 snmp v1 model
snmpv2c snmp v2c model
usm usm model
<sec_name> security name in string form
no-auth no auth
auth-no-priv auth, no priv
priv priv
other storage other
volatile storage volatile
non-volatile storage non-volatile
permanent storage permanent
read-only storage read-only
mod modify an entry
Example:
CASA-CMTS(config)# snmp tgt-param
InformV3SNMPv3Notify 3 snmpv2c
noAuthNoPrivUser no-auth non-volatile
Where:
<view>: view name in string form
<subtree>: subtree name in string form
<mask>: mask name in string form
include include
exclude exclude
other storage other
volatile storage volatile
non-volatile storage non volatile
permanent storage permanent
read-only storage read-only
mod modify an entry
Example:
CASA-CMTS(config)# snmp tree-family
docsisManagerView 1.3.6.1.4.1.9.9 252 exclude
non-volatile
Where:
<engine_id> local use engine id in string
form
<user_name> user name in ASCII format
no-auth no authentication
md5 MD5 authentication
sha SHA authentication
0 use clear authentication
password as input
1 use encrypted authentication
password as input
<auth_pswd> authentication password, use
- if no password
no-priv no privilege
des use DES
aes use AES
0 use clear privilege password
as input
1 use encrypted privilege
password as input
<priv_pswd> privilege password, use - if no
password
Other storage other
volatile storage volatile
Example:
CASA-CMTS(config)#snmp user AuthPrivMD5User
user1 md5 1 zYtNm no-priv 1 - non-volatile
anyWhereTag
snmpOutGetResponses: 0
snmpOutTraps: 0
snmpEnableAuthenTraps: 1
snmpSilentDrops: 0
snmpProxyDrops: 0
CASA-CMTS(config)# no software-health-check
snmpd
Configuring IPDR
CASA CMTS supports IP Detail Record (IPDR). IPDR is an open, vendor-independent standard
defined in the Network Data Management, and provides billing interface and record-keeping for
any type of services that can be delivered over an IP-based network.
This section describes the CLI commands for the following IPDR operations:
Example:
Configuring IPsec
This section describes the CLI commands for IPsec operations currently supported by the Casa
CMTS. The supported operations are:
Enabling IPsec services
Configuring the IPsec PreKey
Deleting the IPsec PreKey
Displaying IPsec PreKey
Configuring IPsec Phase 1
Configuring IPsec Phase 2
Displaying the IPsec information
Deleting the IPsec configuration
Adding the IPsec security policy
Removing the IPsec security policy
Displaying the IPsec security policy database
IPsec will automatically start when all parameters are correctly configured the first time.
Phase II:
Example:
CASA-CMTS(config)# ipsec 192.168.2.125
PACKETCABLE
CASA-CMTS(config)# show ipsec prekey
192.168.2.125 PACKETCABLE
To delete:
CASA-CMTS(config)# no ipsec 192.168.2.125 prekey
CASA-CMTS(config)#
Where:
<policy_name>: Policy name in string format. 'all' is
reserved, do not use it
Example:
CASA-CMTS(config)# ipsec phase1 test 10.170.1.1
60 1 3des md5 psk aggressive
Where:
<policy_name> Policy name, 'all' is reserved, please do
not use it
<src_ip_addr> Source ip address; for any, then
destination IP will not take effect
<dst_ip_addr> Destination IP address in dotted format
A.B.C.D
<group> diffie-hellman group, 0 refers to a group
not specified, 1 refers to PFS group 1
<lifetime> Interval for re-key in unit of minutes.
Example:
CASA-CMTS(config)# ipsec phase2 test 10.170.1.1
10.170.2.1 0 60 des md5 deflate
phase I:
policy name : test
IP address : 10.170.1.1
exchange mode: aggressive
lifetime : 60
proposal : encryption : triple DES
hash : MD5
auth-method: pre-shared key
dh-group : 1
phase II:
policy name : test
IP address source : 10.170.1.1
IP address remote : 10.170.2.1
lifetime : 60
encryption : des
hash : MD5
compression-method: deflate
Example:
CASA-CMTS(config)# no ipsec phase1
192.168.2.125server
CASA-CMTS# show ipsec info
IKE status: running
phase I:
phase II:
policy name : 192.168.2.125server
IP address source : 192.168.2.247
IP address remote : 192.168.2.125
lifetime : 5
encryption : 3des
hash : SHA
Example:
CASA-CMTS(config)# show ipsec spd detail
192.168.2.125 192.168.2.247
esp mode=transport
spi=52611555(0x0322c9e3) reqid=0(0x00000000)
E: 3des-cbc 55ae1807 339b4a01 01a8f8a9
9c988f29 7f9cf461 d343cd21
A: hmac-sha1 bb6f05b7 06c68b44 15bab266
3ff302d1 09d4d374
seq=0x00000000 replay=4 flags=0x00000000
state=mature
created: Jun 30 14:11:09 2008 current:
Jun 30 14:11:12 2008
diff: 3(s) hard: 300(s) soft:
240(s)
last: Jun 30 14:11:09 2008 hard:
0(s) soft: 0(s)
current: 128(bytes) hard: 0(bytes)
soft: 0(bytes)
allocated: 2 hard: 0 soft: 0
sadb_seq=1 pid=924 refcnt=0
192.168.2.247 192.168.2.125
esp mode=transport
spi=4055512964(0xf1ba3784) reqid=0(0x00000000)
E: 3des-cbc e87c92e6 f13102d3 50840db3
d3f42dc9 5efce445 efe14f97
A: hmac-sha1 784a8db4 0386eede 8423adc9
281ddcf5 1fd49c84
seq=0x00000000 replay=4 flags=0x00000000
state=mature
created: Jun 30 14:11:09 2008 current:
Jun 30 14:11:12 2008
diff: 3(s) hard: 300(s) soft:
Casa CMTS Software Configuration Guide 541
CASA CMTS
240(s)
last: Jun 30 14:11:09 2008 hard:
0(s) soft: 0(s)
current: 240(bytes) hard: 0(bytes)
soft: 0(bytes)
allocated: 2 hard: 0 soft: 0
sadb_seq=0 pid=924 refcnt=0
Where:
Example:
Show the default displays for individual CMs.
CASA-CMTS# show cable modem
MAC State
Value Description of registration and status conditions
init(r1) Initial ranging request sent by cable modem (CM) to CMTS.
init(r2) The CMTS received an initial ranging rquest from the CM. The CMTS has
responded and returned RF power information, timing offset, and frequency
adjustments to the CM. The CM and CMTS link is still in the ranging state, and
Check the RF attenuations if initial ranging remains stuck. Use the debug cable
ranging command for information.
init(ov) CMTS is static load balancing and is using the upstream channel ID override
and/or downstream frequency override to move the modem to new channel.
Note: It is also possible that the upstream is at capacity and has no additional
bandwidth for the CM to finish registration and come online. If this is the case
make sure load balancing is enabled.
init(ua) Upstream channel adjustment (for DOCSIS 3.0 modems).
init(d) CMTS has received the DHCP discover message; first IP broadcast packet has
been received from the CM.
init(i) The CM has received the DHCPOFFER reply from the DHCP server, but the CM
has not yet replied with a DHCPREQUEST message, nor has it sent an IP packet
with its assigned IP address.
It is possible that the CM has received the DHCPOFFER reply from the DHCP
server, but the reply might have invalid options for that particular CM.
init(e) Early authentication and encryption started (3.0 modems).
Check the modem certificate if stuck in this state.
init(t) Configuration file download complete; time-of-day (TOD) exchange started.
init(r) CMTS received register-request from cm,but has not received reg-ack yet.
If stuck, check the modem config file. Use debug cable registration to debug
registration request received.
init(bpi) Start baseline privacy. If stuck in this state, check the modem certificate and
ensure that the CM is synchronized with the BPI server.
resetting The CM is being reset; registration process restarting.
Non-error Status Conditions
cc(r1) The CM had previously registered and was online, but the CMTS has sent a
Downstream Channel Change (DCC) or Upstream Channel Change (UCC)
request message to the CM. The CM has started moving to the new channel,
sending an initial ranging request on the new downstream or upstream channel to
the CMTS. At the MAC layer, the CM is not yet passing traffic on the new channel
and is considered in the offline state. This state does not trigger the flap-list
counters.
cc(r2) This state normally follows cc(r1) and indicates that the CM has finished its initial
ranging on the new channel, and is currently performing continuous ranging on the
new channel. At the MAC layer, the CM is not yet passing traffic on the new
channel and is considered in the offline state. This state does not trigger the flap-
list counters.
Note: If BPI was enabled in the DOCSIS configuration file sent to the CM, the CM
is using BPI encryption unless other messages indicate that the BPI negotiation
and key assignments have failed.
online(pkd) The CM has registered with the CMTS. However, network access for CPE devices
using this CM has been disabled through the DOCSIS configuration file. BPI is
enabled and the key-encrypting key (KEK) is assigned.
online(pt) The CM has registered with the CMTS. BPI is enabled and traffic-encrypting key
(TEK) is assigned. BPI encryption is now being performed.
online(ptd) The CM has registered with the CMTS. However, network access for CPE devices
using this CM has been disabled through the DOCSIS configuration file. BPI is
enabled and traffic-encrypting key (TEK) is assigned. BPI encryption is now being
performed. This state is equivalent to the online(d) and online(pt) states.
online(pk) The CM has registered with the CMTS. BPI is enabled and the key-encrypting key
(KEK) is assigned.
expire(pk) The CM has registered. BPI is enabled and the KEK was assigned, but the
current KEK expired before the CM could successfully renew a new KEK value
expire(pke) The CM has registered. However, network access for CPE devices using this CM
has been disabled through the DOCSIS configuration file. BPI is enabled and the
KEK was assigned, but the current KEK expired before the CM could successfully
renew a new KEK value. This state is equivalent to the online(d) and expire(pk)
states
expire(pt) The CM has registered. BPI is enabled and the TEK was assigned. The current
TEK expired before the CM could successfully renew a new KEK value.
expire(ptd) The CM has registered. However, network access for CPE devices using this CM
has been disabled through the DOCSIS configuration file. BPI is enabled and
traffic-encrypting key (TEK) was assigned, but the current TEK expired before the
CM could successfully renew a new KEK value. This state is equivalent to the
online(d) and expire(pt) states.
Error status conditions
reject(pk) The KEK assignment is rejected and BPI encryption has not been established.
reject(pkd) The CM has registereed. However, network access for CPE devices using this CM
has been disabled through the DOCSIS configuration file. BPI encryption was not
established because KEK assignment was rejected. This state is equivalent to the
online(d) and reject(pk) states.
reject(pt) The TEK assignment is rejected and BPI encryption has not been established.
reject(ptd) The CM has registered. However, network access for CPE devices using this CM
has been disabled through the DOCSIS configuration file. BPI encryption was not
established because TEK assignment was rejected. This state is equivalent to the
online(d) and reject(pt) states.
Field Description
MAC Address The MAC address of the CM.
IP Address The IP address assigned by the DHCP server to the CM.
Prim Sid The primary SID assigned to this CM.
MAC Domain MAC domain ID.
Upstream The line card/port/channel providing the upstream for this CM.
Downstream The line card/port/channel providing the downstream for this CM.
Upstream The set of upstream channels assigned to this modem for bonding (3.0
Channel Set modems).
Downstream The set of downstream channels assigned to this modem for bonding (3.0
Channel Set modems).
Unusable List of assigned channels that are not usable by the modem.
channel list
MAC State The current state of the MAC layer.
Received The power level (in dB) received by the CM.
Power
Timing Offset The timing offset for the CM, in ticks, as recognized by the CMTS. (A tick is
6.25/64 microseconds.) This is the delay between when a particular cable
modem is scheduled to make a transmission and when the CMTS actually
receives it.
Note: The timing offset shown here is typically smaller than the TX Time
Offset value shown by the show cable modem remote-query command, since
the latter value is the offset as recognized on the CM (which will include any
internal delay between when the CM software begins the transmission and
when the bits actually appear on the local cable interface).
Initial Timing The initial timing offset for the CM, in ticks, as recognized by the CMTS (see
Offset above).
Num CPEs, Indicates the number of CPE devices for which the CM is providing services.
CFG Max-CPE
Number of Indicates the maximum number of IP addresses assigned to CPE devices
CPE IPs behind this CM, as configured by the cable max-hosts command.
Ver, MAC Displays the maximum supported version of DOCSIS that the CM supports
Version (DOCSIS 1.0, DOCSIS 1.1, DOCSIS 2.0, DOCSIS 3.0).
QoS Prov, QoS Displays the version of DOCSIS that the CM currently is provisioned for
Provisioned (DOCSIS 1.0, DOCSIS 1.1, DOCSIS 2.0).
Mode
Enable Indicates whether the CM is capable of DOCSIS 2.0 (ATDMA) operation, as
DOCSIS 2.0 determined by the presence and value of the Enable 2.0 Mode (TLV39) field in
Mode the CM's Registration Request message or in the DOCSIS configuration file.
The valid values are:
Y = TLV 39 was set to 1, indicating that the CM has enabled DOCSIS 2.0
mode. The CM could still be registered for DOCSIS 1.1 operations, however,
on DOCSIS 1.X interfaces.
N = Either the TLV 39 field was not present in the CM's Registration
Request message, indicating that the CM is not capable of DOCSIS 2.0
operations, or the TLV 39 field was set to 0 in the DOCSIS configuration file,
preventing the CM from using the DOCSIS 2.0 mode.
Initial Ranging Initial ranging message that the CM sends: RNG-REQ for DOCSIS 1.0/1.1/2.0
Message CMs, B-INIT-RNG-REQ for DOCSIS 3.0 CM.
Registration Registration request message that the CM sends: REG-REQ for DOCSIS
Where:
<ip-address> Displays the CPE devices for the CM
<ipv6-address> with the specified IP address.
<mac-address> Displays the CPE devices for the CM
with the specified MAC address.
Example:
List the CPE devices by their MAC and IP addresses:
CASA-CMTS# show cable modem 0050.bfb9.021d cpe
Show sample output for the default form of the show cable modem registered command.
CASA-CMTS# show cable modem online
state.
ip-address Display IPv4 and IPv6 cable modem addresses.
mac Display cable modem MAC information.
maintenance Display cable modem active time statistics per interface.
non-bonding Display cable modem non-bonding (modems capable of bonding but
have only 1 channel assigned
offline Display previously-registered cable modems that are now offline.
online Display the current list of cable modems that have a MAC status of
online.
phy Display cable modem physical information statistics, such as
transmission and signal-to-noise reduction data.
qos Display quality-of-service statistics including transmission and
throughput rates.
remote-query Display cable modem performance statistics immediately, or at the
specified upstream or downstream module.
rogue Display cable modems spoofing statistics during ranging.
summary Display cable modem summary information, including total modem
counts, active and offline modems, modems that have registered, and
secondary modems.
tftp-bypass Display cables that have bypassed TFTP and have not uploaded a
modem configuration file.
upstream Display cable modems per the specified system upstream slot, port
number, physical channel number, and upstream logical channel.
vendor Display cable modem vendor-specific information, or filtered vendor
information using the all, config, default, or summary options.
verbose Displays the extended version of the show cable modem command
output by including all statistics.
In addition, the following information can be displayed about each cable modem by specifying the
MAC or IP address: show cable modem [<mac-address> | <ip-address> | < ipv6-address>]:
interfaces.
errors Display upstream and downstream CRC and HCS errors.
mac Display cable modem MAC information.
maintenance Display cable modem active time statistics per interface.
multicast-session Display multicast session information.
mask Display remote query statistics
online Display the current list of cable modems that have a MAC status
of online.
phy Display cable modem physical information statistics, such as
transmission and signal-to-noise reduction data.
qos Display quality-of-service statistics including transmission and
throughput rates.
remote-query Display cable modem performance statistics immediately, or at
the specified upstream or downstream module.
vendor Display cable modem vendor-specific information, or filtered
vendor information using the all, config, default, or summary
options.
verbose Displays the extended version of the show cable modem
command output by including all statistics.
Sequence the displayed results by the latest upstream logical channel order:
CASA> show cable flap-list sort-int
CASA> show cable flap-list downstream x/y/z sort-int
Example:
See examples below.
Example: Show cable modem summary command with the total option:
CASA-CMTS# show cable modem summary total
Example:
See examples below.
Example:
See examples below.
2/1/2 0 0 0
2/1/3 0 0 0
2/2/0 0 0 0
2/2/1 0 0 0
2/2/2 0 0 0
2/2/3 0 0 0
2/3/0 0 0 0
2/3/1 0 0 0
2/3/2 0 0 0
2/3/3 0 0 0
MAC Address US IF DS IF Sid USPwr(dB) USSNR Timing MicroReflec DSPwr DSSNR Mode
TX RX (dB) Offset (dBc) (dB) (dB)
0018.4de7.3d2a 11/0.0/0 1/0/0 1 - -0.5 30.8 - - - - tdma
c446.199d.fee8 11/0.0/0 1/0/0 5 - 0.7 27.4 - - - - tdma
information.
Where:
<mac-address> CM MAC address.
<ip-address> CM IPv4 or IPv6 address.
<ipv6-address>
<verbose> Provides detailed information.
<immediate> Obtains remote query info directly
from the cable modem when
background remote query feature is
turned on.
<string> SNMP community string to poll the
CMs.
To show the cable modem remote information according to the specific upstream:
Step Command Purpose
1 show cable modem remote-query upstream (<x/y> | <x/y/z>) Show the cable
modem remote
Where: information
<x> Line card slot number. according to the
<y> Port number. specific
upstream
<z> Channel number for downstream module or logical
channel number for upstream module.
To show the cable modem remote information according to the specific downstream:
Step Command Purpose
1 show cable modem remote-query downstream (<x/y> | Show the cable
<x/y/z>) modem remote
information
Where: according to the
<x> Line card slot number. specific
<y> Port number. downstream.
<z> Channel number for downstream module or logical
channel number for upstream module.
The commands get all the CMs MAC-addresses from DDM, and then get the IP-addresses from
the CM MAC-addresses, and finally access the CMs remote information through SNMP
communication.
Example:
Change the community interval to be 1000:
CASA-CMTS(config)# cable modem remote-query
1000
Example:
CASA-CMTS(config)# cable flap-list aging 15
This configuration can be saved to the startup configuration. To turn the messages back on:
CASA-CMTS(config)#cable event priority warning <hex>
CASA-CMTS(config)#cable event priority notice <hex>
Where <hex>:
Registration can also be accelerated by changing the ranging back off values from the default (0
4) to 4 10. This is especially helpful on channels with 200 or more cable modems.
Example:
CASA-CMTS(config)#cable flap-list trap enabled
Example:
CASA-CMTS(config)#cable modem deny 0015.f2fe.cef2
Examples:
Examples:
Where:
<mac_address> Specifies the 48-bit hardware address
(MAC address) of an individual CM, or of
any CPE devices or hosts behind that CM.
If the optional downstream or upstream
parameter is specified, then the
downstream or upstream counts will be
reset respectively.
<ip_address> Specifies the IPv4 address of the modem
in 32-bit dotted decimal notation. A.B.C.D
<ipv6_address> Specifies the IPv4 address of the modem
in 128-bit notation. xxxx:xxxx:...:xxxx
downstream Specifies clearing of downstream counters
only.
upstream Specifies clearing of upstream counters
only.
reset Resets the specified cable modem
Example:
CASA-CMTS(config)#clear cable modem 015.f2fe.cef2
If no options are specified, all CM counters will be reset. If a mac-address is specified, only the
counters for that cable modem will be reset.
If set to 0 (default), the modem will maintain an offline state indefinitely and will not be cleared. If
set to a value in the range 1 to 8760 hours (1 year), the CMTS will clear all modems that have
been offline for the specified number of hours.
In the above example, registered cable modems that have been in the offline for 10 hours will be
cleared by the CMTS and will reregister with the CMTS when they become available. Use the
show cable modem offline command to display the previous modem state and the total time
duration of the modem (s) being offline.
CASA(config)# show cable modem offline
Example:
See examples below.
Example:
CASA-CMTS# cable modem vendor 00:00:00 ABC
Example:
CASA-CMTS(config)# no cable modem vendor 0:00:00
Example:
CASA-CMTS#show cable modem vendor all
system default cm vendor database:
cable modem vendor 00:0f:9f "Motorola"
cable modem vendor 00:11:1a "Motorola"
cable modem vendor 00:11:80 "Motorola"
cable modem vendor 00:12:25 "Motorola"
cable modem vendor 00:13:71 "Motorola"
cable modem vendor 00:14:e8 "Motorola"
cable modem vendor 00:18:c0 "Motorola"
cable modem vendor 00:1a:ad "Motorola"
cable modem vendor 00:1b:dd "Motorola"
cable modem vendor 00:0f:21 "Sci Atl"
cable modem vendor 00:11:e6 "Sci Atl"
cable modem vendor 00:14:f8 "Sci Atl"
cable modem vendor 00:16:92 "Sci Atl"
cable modem vendor 00:18:68 "Sci Atl"
cable modem vendor 00:19:47 "Sci Atl"
cable modem vendor 00:1c:ea "Sci Atl"
Example:
Set 00:0f:9f to default value after modifying it
Example:
See example below.
Classifier ID: 5
ServiceFlow ID: 641
Direction: Down
Rule Priority: 20
Activation State: Active
IP classifiers:
ToS: 0x00 0x00 0x00
Protocol: 17
Source Address: 0.0.0.0
Source Mask: 255.255.255.255
Destination Address: 0.0.0.0
Destination Mask: 255.255.255.255
Source Port Start: 0
Source Port End: 65535
Destination Port Start: 0
Destination Port End: 65535
LLC classifiers:
Destination Mac Address: 0000.0000.0000
Destination Mac Mask: 0000.0000.0000
Source Mac Mask: 0000.0000.0000
Ether Type: 0x00
User Priority Low: 0x0
User Priority High: 0x0
Vlan ID: 0x0
Bit Map: 0xb
Classifier ID: 4
ServiceFlow ID: 767
Direction: Down
Rule Priority: 10
Activation State: Active
IP classifiers:
ToS: 0x00 0x00 0x00
Protocol: 256
Source Address: 0.0.0.0
Source Mask: 255.255.255.255
Destination Address: 0.0.0.0
Destination Mask: 255.255.255.255
Source Port Start: 0
Casa CMTS Software Configuration Guide 573
CASA CMTS
Example:
See example below.
Example:
See example below.
Example:
See example below.
Example:
See example below.
are added to
Example: the deny list.
CASA-CMTS# show cable modem deny
cable modem deny 0015.f2fe.cee6
Total: 1 0 1 0 0 1 0 1 0
<grp_id> Docsis-mac ID
Example:
CASA-CMTS(config)# interface docsis-mac 1
CASA-CMTS(conf-if-mac 1)#
2 cable cm-status event <a> max-timer <b> max-number <c> Define the event.
Where:
<a> Specifies the event code; valid values are 1-10
<b> Maximum Event Holdoff Timer
<c> Timer value units in 20 milliseconds; valid values are
0-255.
Where:
<string> The list of events in the format: 1,2,3 . . . ; valid
values are 1-10.
service flow.
Example:
CASA-CMTS(config)#show cable modem qos
To display the total number of SIDs currently in use, enter the show cable modem qos
command with the count-only output modifier.
To display the total number of SIDs currently in use over the specified MAC domain, enter the
show cable modem docsis-mac ommand with the count-only output modifier.
Subscriber management
Casa CMTS supports Subscriber Management features defined in DOCSIS 3.0. This section
describes how to use CLI commands to configure those features. It covers the following
operations:
CM controls
Enabling subscriber management.
Setting a mode for the CM to learn the CPE IP address without DHCP.
Setting maximum ipv4 CPEs behind the CM.
Setting maximum ipv6 CPEs behind the CM.
Removing all CPEs behind the CM.
Default settings
Default settings if CM configuration file does not specify otherwise
Filters
Setting filter rule
Removing all IP and TCP-UDP filters
Example:
CASA-CMTS(config)#docsis submgt cm-control cm 1
active true
Setting the mode for a CM to learn the CPE IP address without DHCP
To set or unset the mode for a CM to learn the CPE IP address:
Step Command (config) Purpose
1 docsis submgt cm-control cm <cm_id> learnable true Set or unset the
docsis submgt cm-control cm <cm_id> learnable false mode for a CM to
learn the CPE IP
Where: address.
<cm_id> CM ID as defined and distributed by the
CMTS as an identifier. Use the show cable
modem and then use the show qos ds cm
qam command with the cm_id modifier. The
identifier can also be retrieved by walking the
MIB entry docsIfCmtsCmStatusMacAddress.
Example:
CASA-CMTS(config)#docsis submgt cm-control cm 1
learnable true
Example:
Where:
<num> Maximum number of ipv6 CPEs behind CM, values
are 0 to 1023.
Example:
CASA-CMTS(config)#docsis submgt cm-control cm 1
max-cpe-ipv6-prefix 10
Where:
<filter_group> Filter group, 1-65535
<filter_index> Filter index, 1-65535
<bitmap> bitmask, 0-ffffff
Example:
Example:
CASA-CMTS# show docsis submgt cm-control cm 1
cm=1 maxCpe IPv4=16 IPv6=16 active=false
learnable=true reset=0 numOfCpeIp=0
Casa CMTS Software Configuration Guide 586
CASA CMTS
Example:
CASA-CMTS#show docsis submgt cm-cpe-ip cm 3
Displaying IP filter
To display IP filter:
Step Command Purpose
1 show docsis submgt ip-filter [<cm_id>] Display the IP
filter.
Where:
<cm_id> Cable modem ID as defined and distributed by
the CMTS as an identifier. Use the show cable
modem and then use the show qos ds cm qam
command with the cm_id modifier. The identifier
can also be retrieved by walking the MIB entry
docsIfCmtsCmStatusMacAddress
Example:
CASA-CMTS(config)# cable host authorization
0015.f2fe.8d6a 10.160.1.40
CASA-CMTS(config)#
Example:
Set the PAT insertion interval to 500 ms:
CASA-CMTS(config)# pat interval 500
Example:
Set the PMT insertion interval to 500 ms:
CASA-CMTS(config)# pmt interval 500
SI table generation and insertion setting is chassis based. When enabled, it applies to all QAM
downstream channels on the chassis.
Example:
CASA-CMTS(config)# interface qam 0/4
CASA-CMTS(config-if-qam)#
2 channel <ch-id> network id <net-id> Set and verify
the network ID.
Where:
<ch-id> QAM channel number in the range 0 to 3.
<net-id> Network ID number in the range 0 to 65535. The
default setting is 0.
Example:
Set network ID to 16 for channel 2 of QAM port 4:
CASA-CMTS(config-if-qam)# channel 2 network id 16
Example:
CASA-CMTS(config)# interface qam 0/4
CASA-CMTS(config-if-qam)#
Example:
Set transport stream ID to 500 for channel 2 of QAM port 4:
CASA-CMTS(config-if-qam)# channel 2 transport stream id
500
Configuring TOT
The TOT (Time Offset Table) carries the UTC-time and date information as well as the local time
offset. It is transmitted in TS packets with a PID value of 0x0014 and a table ID of 0x73. This
section covers commands for the following TOT configurations:
Example:
Set the time zone to the Central European Time:
CASA-CMTS(config)# si generator tot country-code
cet region-id 0
Where:
<-12 to 13> Offset hours to UTC-time. Valid values are 12
to 13.
<0, 30, 45> Minute part of the offset. Valid values are 0,
30, and 45.
Example:
If the offset in a time zone is 5 hours and 30 minutes (such as in
India), the command is:
Example:
Set daylight saving time beginning in the first Sunday of April at
2am:
Note: The local CMTS log file is not affected by cable events that have been disabled with the
cable event command.
Note: The local CMTS log file is not affected by cable events that have been disabled with the
cable event command.
Example:
CASA-C10G(config)# no cable event 83020203
CASA-C10G(config)# show cable event running-
config
.
.
cable event 83020103
cable event 83020200
cable event 83020201
cable event 83020202
no cable event 83020203
Example:
CASA-C10G(config)# show cable event running-
config
.
.
.
cable event 83020103
cable event 83020200
cable event 83020201
cable event 83020202
no cable event 83020203
1 [no] cable event priority {emergency | alert | critical | error | Configure event
warning | notice | informational | debug} flags priority reporting
flags.
Where:
<flags> See Table 5 below.
immediate attention. This problem might also be affecting other parts of the
network.)
alert
Sets the event reporting flag for alert system error messages. (Alert messages
indicate that some type of system or connection failure has occurred and
requires immediate attention.)
critical
Sets the event reporting flag for critical system error messages. (Critical
messages indicate that an error occurred which requires immediate attention to
avoid system or connection failure.).
error
Sets the event reporting flag for error system error messages. (Error messages
indicate that an error condition occurred that requires attention to resolve. Failure
to address this problem will result in some type of system or connection failure in
the near future.).
warning
Sets the event reporting flag for warning system error messages. (Warning
messages indicate that a condition occurred that indicates attention is needed in
near future to avoid potential problems. Failure to address this problem could
result in some type of system or connection failure later on.) .
notice
Sets the event reporting flag for notice system error messages. (Notice
messages indicate that a situation occurred that is normal but is significant
enough that system administrators might want to notice.)
informational
Sets the event reporting flag for informational system error messages.
(Informational messages might or might not be significant to the system
administrators.).
debug Sets the event reporting flag for debug system error messages. (Debug
messages appear only when debugging has been enabled.).
Sets the event reporting flags value, in hex, which specifies how this
flags
particular type of event message should be reported. The valid values are shown
below:
0x00 DOCSIS messages are not reported.
0x80 DOCSIS messages are saved in a local log on the CMTS.
0xA0 DOCSIS messages are reported to the local log and SYSLOG
servers
0xC0 DOCSIS messages are reported to the local log and trap receivers
0xE0 DOCSIS messages are reported to the local log, SYSLOG servers
and trap receivers
Displaying the current priority and flags for cable event logging
To show the event reporting flags for cable event messages:
To disable the logging of a DOCSIS syslog server, use the no form of this command.
threshold command in global configuration mode. To restore the default number, use the no form
of this command.
Logging levels determine the severity of the information that is collected in the log file. The user
can set the logging levels as needed. Table 6 lists and briefly describes the logging levels and
corresponding keywords used to set the logging levels for these types of messages. Level 0,
emergencies, is the highest level and logs only the most serious errors. Level 7, debugging, is the
lowest level. Level 7 logs include the most messages because Level 7 logs include messages
from all levels.
This sub-section explains how to use logging commands to redirect and limit the types of logging
messages.
Example:
Set the level of messages displayed on monitors to notification:
CASA-CMTS(config)# logging system notifications
Specifying the highest severity level (alert) disables logging of all messages for the specified
user. This is useful when users log in regularly to run a process, for example. Each log-in and
log-out creates an entry in the log file. This can fill the log file with entries that are not useful.
Example:
Exclude all logging messages associated with user test1 from the
log file:
Example:
Exclude all error, warning, notification, information, and debugging
messages associated with user test1 from the log file. All alert
and critical messages associated with user test1 will continue to
Casa CMTS Software Configuration Guide 603
CASA CMTS
be logged.