hi,
I'm trying to validate manually the cisco formula used to calculate the percentage of correctable and uncorrectable FECs and put it on a graph, however I find that my result is not exactly in the ranges mentioned by cisco, maybe I'm doing something wrong, someone has any suggestions? this is the procedure I follow:
Get values for uptream0 by snmp:
TIME 8:50 (XY0)
Interface Unerrorreads Corrected Uncorrectables
Cable1/0/U0 360300337 7358499 20809
TIME 8:55 (XY1)
Interface Unerrorreads Corrected Uncorrectables
I currently manage the networking for a few companies where we get bandwidth from the local isp. Are there any legal issues or regulations that need to be covered if I want to use my own cmts and provide data for each company I serve? I mean, can I just use my own modems that are synced to my server across the public infrastructure?
Hi,
I am going through the D3.0 security spec .. Can somebody guide me on
1. what is a dynamic service addition request(DSA-REQ)?
2. When is it used?
3. Is it related only to multicast traffic?
Hi,
I have a Motorola BSR 64K. I am going through the the CLI documentation. i am not able to fugure out the way to choose between BPI 1.0 mode and BPI+ mode for a CM.
I just get the option to enable security for the CM in the CM configuration file when I use SBConfigedit.
Do I have to configure any option in the CM configuration file to choose between BPI 1.0 and BPI+ mode?
HI .. I am a newbie .. I request you to correct me in the following assumption
1. If a person gets to know the public rsa key of a cable modem(transmitted during Auth-request phase) , then he would be able to decrypt the auth info(which is encrypted with CM's rsa public key) trasmitted from CM to CMTS.
2. The auth info is used to obtain KEK and HMAC digests which are used later.
3. Again, TEK is encrypted by using KEK, which the hacker already knows.
4. The hacker would then be able to decrypt all the following messages.
Hi ..
could someone please brief me about the CM authentication process. the process involved in encrypting unicast traffic and multicast traffic. I went through the DOCSIS 2.0 spec. I am confused. could somebody please help me with this?