|
Table Of Contents
A - B - C - D - F - G - I - K - L - N - O - P - R - S - T - U - V - W -
Index
A
ACS
definition GL-1
URL, configuring 3-8
URL, discovery 2-5
administrator user interface
accessing 15-2
ACS URL, configuring 3-8
BAC architecture, and 9-3
configuring 15-1
connection request 12-4
device's provisioning group, correcting 14-7
device faults, viewing 8-7
device history, configuring 8-4
icons (table) 15-5
logging in 15-2
HTTP transport 15-3
SSL transport 15-3
logging out 15-5
parameter dictionaries, managing 7-5
adding 7-5
deleting 7-6
replacing 7-6
viewing 7-6
performance statistics, collecting
enabling, disabling 11-12
server, monitoring 11-11
advanced concepts
See tools and advanced concepts
agent, SNMP
BAC architecture, and 9-4
MIB support 11-5
alerts, definition GL-1
message format 11-1
relating to
DPE 11-2
RDU 11-2
watchdog process 11-4
API, definition GL-1
about DPEs 2-3
about provisioning groups 2-5
about RDU 2-3
administrator user interface 9-3
agents
SNMP 9-4
watchdog process agent 9-2
command line interface 9-3
deployment 2-1
overview 2-2
watchdog process 2-6
audit logs, definition GL-1
authentication
about 13-13
available options 13-17
client certificate, configuring 13-16
external client certificate, configuring 13-16
shared secret, configuring 13-13
autoconfiguration server
B
backup and recovery of database 10-4to 10-6
C
caching, definition GL-1
cautions
regarding
custom properties, deleting 17-5
disk space requirement figures 10-3
network deployment with an evaluation license key 17-16
template files, deleting 17-15
troubleshooting devices 8-9
significance of xix
cipher suites
definition GL-1
Cisco 11500 Content Services Switch
Cisco CSS, configuring 12-13
classes of service
about 4-3
configuring
adding 17-3
deleting 17-4
modifying 17-3
client certificate authentication
configuring 13-16
overview 13-1
command line interface
DPE, accessing 9-3
configuration history
configuration template
about 5-1
administrator user interface, using 17-11to 17-15
authoring 5-12
conditionals, using 5-17
includes, using 5-15
parameter substitution, using 5-14
configuration utility
about 5-20
template, adding 5-21
template processing, testing 5-23, 5-24, 5-25
template syntax, validating 5-22, 5-23
using 5-21
features 5-3
access control 5-8
notification 5-7
parameters, schema (figure) 5-5
prerequisites, schema (figure) 5-9
schema (figure) 5-3
template processing files (table) 5-2, 6-3
configuration workflows and checklists
component workflows
DPE checklist (table) 3-2
RDU checklist (table) 3-1
technology workflows
DPE configuration (tables) 3-5
provisioning group configuration 3-7
RDU configuration (table) 3-3
RDU configuration, preregistering device data 3-4
configuring BAC
class of service
adding 17-3
deleting 17-4
modifying 17-3
connection requests 12-2
authentication 12-3
disabling 12-6
methods, discovered 12-4
reachability 12-6
CWMP service
DPE ports 12-2
defaults
configuration options, selecting 17-6
CWMP 17-7
RDU 17-9
system 17-10
device history
enabling, disabling 8-4
number of entries 8-5
viewing 8-4
discovering device data
about 12-7
parameters 12-8
files, managing
adding 17-13
deleting 17-15
exporting 17-15
replacing 17-14
viewing 17-14
adding a license 17-16
modifying a license 17-16
provisioning data, publishing
Datastore changes 17-19
plug-in settings, modifying 17-19
RDU extensions, managing
custom extension points, installing 17-18
new class, writing 17-17
viewing 17-18
connection request service
about 12-2
authentication 12-3
disabling 12-6
discovered 12-4
use FQDN 12-5
use IP 12-5
reachability 12-6
workflow (figure) 12-3
CPE management
authentication 13-13
available options 13-17
client certificate, configuring 13-16
external load balancer, configuring 13-16
shared secret, configuring 13-13
device assignment to provisioning groups 4-11
automatic 4-11
explicit 4-11
explicit and automatic approach 4-12
device configuration synchronization 4-6
device deployment options 4-8
preregistered 4-8
unregistered 4-8
discovering CPE parameters 4-4
default parameters (table) 4-5
instruction generation, and 4-5
overview 4-1
customer premises equipment, definition GL-1
custom properties
configuring 17-5
overview 5-13
CWMP
about 1-3
definition GL-1
about authentication 13-1
connection request 12-2
authentication 12-3
disabling 12-6
method, discovered 12-4
reachability 12-6
discovering device data
about 12-7
parameters 12-8
troubleshooting 12-9
DPE keystore, using keytool 13-3
certificates for client authentication, importing 13-10
certificate signing request, generating 13-7
existing signed server certificate, importing 13-4
keytool commands 13-5
self-signed certificate, displaying 13-7
server certificate and private key, generating 13-6
signed certificate, verifying 13-8
signed certificate into server certificate, importing 13-9
signing authority certificate into cacerts, importing 13-8
DPE ports 12-2
about 13-1
key and certificate management 13-2
SSL, configuring 13-3
D
database management
backup and recovery
backing up 10-4
recovering 10-5
restoring 10-6
disk space requirements 10-3to 10-4
caution regarding 10-3
handling out 10-3
failure resiliency, understanding 10-1to 10-2
automatic log management 10-3
DB_VERSION 10-3
history log 10-3
storage 10-2
transaction log 10-2
location, changing 10-6to 10-7
defaults, configuring
CWMP 17-7
RDU 17-9
system 17-10
device diagnostics
configuration history, viewing 8-4
overview 4-12
performance statistics, monitoring 11-12
runStatAnalyzer.sh tool, using 11-13
Device Export
deviceExport.sh tool, using 18-1
device faults
about 8-6
device history
about 8-1
enabling, disabling 8-4
number of entries, configuring 8-5
records, logging 8-5
supported records (table) 8-1
viewing 8-4
device management
about 16-10
administrator user interface, using
adding 16-11
deleting 16-12
devices menu 16-4
displaying live data 16-16
forcing configuration synchronization 16-17
forcing firmware upgrade 16-17
modifying 16-11
performing a Ping test 16-16
rebooting 16-15
regenerating instructions 16-12
relating, unrelating 16-13
requesting a connection 16-15
resetting to factory settings 16-15
searches supported (table) 16-5
setting operations timeout 16-17
controls 16-6
device details, viewing 16-8
Manage Devices page 16-4
searching for devices 16-8
device object model
overview 4-1
relationships (figure) 4-2
relationships (table) 4-3
device operations
about 14-1
conditional execution 14-5
connection modes
immediate 14-2
immediate workflow (figure) 14-3
on-connect 14-3
on-connect workflow (figure) 14-4
device's provisioning group, managing 14-5
correcting 14-6
redirecting 14-5
sample files, accessing 14-1
supported operations (table) 14-2
device troubleshooting
about 8-8
configuring 8-9
disabling 8-10
enabling 8-9
troubleshooting log, viewing 8-11
viewing devices in troubleshooting mode 8-10
log entries 8-11
discovered connection request 12-4
disk space monitoring
disk_monitor.sh tool, using 18-4
documentation
audience xvii
organization xviii
related to this product xx
typographical conventions xix
DPE (Device Provisioning Engine)
about 2-3
alert messages 11-2
command line interface 9-3
component workflow checklist (table) 3-2
definition GL-2
dpe.log file, viewing 19-8
keystore configuring, using keytool 13-3
certificates for client authentication, importing 13-10
certificate signing request, generating 13-7
existing signed server certificate, importing 13-4
self-signed certificate, displaying 13-7
server certificate and private key, generating 13-6
signed authority certificate into cacerts, importing 13-8
signed certificate into server certificate, importing 13-9
license keys 2-4
Cisco CSS, configuring 12-13to 12-19
DNS round robin, using 12-11
hardware load balancer, using 12-12
performance statistics, collecting 11-12
runStatAnalyzer.sh tool, using 11-13
ports, configuring 12-2
RDU synchronization 2-4
server, monitoring 11-11
SSL
about 13-11
authentication options 13-17
configuring 13-11
configuring CWMP service, example 13-12
configuring HTTP file service, example 13-12
defaults (table) 13-11
device authentication, configuring 13-13
states 2-5
technology workflow checklist
CWMP service (table) 3-6
HTTP file service (table) 3-7
viewing
currently registered DPEs 16-21
F
firmware
about 6-1
files, managing
administrator user interface, using 17-11to 17-15
file service 6-4
firmware image 6-4
firmware rules template 6-4
firmware rules template
authoring 6-6
expressions 6-6
internal, external files 6-9
sample 6-10
management mechanisms 6-1to 6-4
direct firmware 6-4
policy based 6-2
upgrade
bypassing, example 6-13
forcing 16-17
FQDN
definition GL-2
use FQDN, connection request 12-5
G
group, managing
group types
deleting 16-19
groups, managing
about 16-19
adding 16-19
deleting 16-20
details, viewing 16-20
group types 16-18
adding 16-18
modifying 16-19
modifying 16-20
relating, unrelating groups 16-20
GUI (see administrator user interface)
I
icons, administrator user interface (table) 15-5
instructions
generation, definition GL-2
generation and processing overview 4-5
IP address
definition GL-2
use IP, connection request 12-5
K
key, certificate management 13-2
keystore
about cacerts 13-2
about server certificates 13-2
configuring, using keytool 13-3
certificates for client authentication, importing 13-10
certificate signing request, generating 13-7
self-signed certificate, displaying 13-7
server certificate and private key, generating 13-6
signed certificate, verifying 13-8
signed certificate into server certificate, importing 13-9
signing authority certificate into cacerts, importing 13-8
keytool commands, using 13-5
sample server certificates 13-3
L
license keys, managing 17-16to 17-17
adding a license 17-16
DPE licensing 2-4
modifying a license 17-16
load balancing
Cisco CSS, configuring 12-13
logging
about 2-7
BAC architecture, and 19-2to 19-3
log file, sample 19-4
log files, rotating 19-4
log levels, configuring 19-4
log levels and structures 19-3
log level tool 19-6
current log level, viewing 19-7
setting 19-6
using 19-6
viewing log files
audit.log 19-5
dpe.log 19-8
perfstat.log 11-13
rdu.log 19-5
troubleshooting.log 8-11
logging into BAC 15-2
N
NAT, definition GL-2
network address translation
Network Time Protocol, definition GL-2
notes
significance of xix
O
overview
configuration management 1-1
device diagnostics and troubleshooting 4-12
features and benefits 1-1
firmware management 1-2
scalability 1-2
security 1-2
technology supported 1-3
P
parameter dictionary 7-1to 7-7
administrator user interface, using 7-5
adding 7-5
deleting 7-6
replacing 7-6
viewing 7-6
custom 7-3
default 7-2
overview 7-1
schema (figure) 7-2
syntax 7-3
preregistered devices 4-8
preregistering device data 3-4
property hierarchy 4-4
provisioning API, definition GL-3
provisioning data, publishing
Datastore changes 17-19
plug-in settings, modifying 17-19
initial configuration
preregistered devices 4-10
unregistered devices 4-10
initial configuration (figure) 4-9
provisioning groups
about 2-5
ACS URL, configuring 3-8
adding a DPE 12-12
definition GL-3
device faults, viewing 8-7
devices, assigning 4-11
automatic 4-11
explicit 4-11
explicit and automatic 4-12
redundancy 12-10
Cisco CSS, configuring 12-13
Cisco CSS, using 12-13
DNS round robin, using 12-11
hardware load balancer, using 12-12
local 12-11
regional 12-11
scalability 12-10
technology workflow 3-7
publishing, definition GL-3
R
RDU (Regional Distribution Unit)
about 2-3
alerts 11-2
component workflow checklist (table) 3-1
definition GL-3
details, viewing 16-25
DPE synchronization 2-4
extensions, managing
custom extension points, installing 17-18
new class, writing 17-17
viewing 17-18
current log level, viewing 19-7
setting 19-6
using 19-6
performance statistics, collecting 11-12
runStatAnalyzer.sh tool, using 11-13
server, monitoring 11-11
technology workflow checklist (table) 3-3
recurring faults
local 12-11
regional 12-11
redundancy, definition GL-3
S
schema (figures)
configuration 5-3
parameter 5-5
parameter dictionary 7-2
prerequisite 5-9
Secure Sockets Layer
security
DPE
administrator user interface, using 11-11
CLI, using 11-12
performance statistics collection
monitoring 11-12
perfstat.log, understanding 11-12
runStatAnalyzer.sh tool, using 11-13
RDU
administrator user interface, using 11-11
SNMP agent 11-4
servers, viewing 16-21to 16-28
DPEs 16-21
RDU details 16-25
service classes
shared secret
configuring 13-13
device password, changing 13-14
device password, correcting 13-15
definition GL-3
SNMP agent
about 2-6
MIB support 11-4
snmpAgentCfgUtil.sh tool
community, adding 11-7
community, deleting 11-8
contacts, setting up 11-10
hosts, adding 11-6
hosts, deleting 11-6
listening port, identifying 11-9
location, changing 11-9
notification types, specifying 11-10
settings, displaying 11-10
starting 11-8
stopping 11-9
SSL
CWMP service, example 13-12
DPE keystore, keytool commands (table) 13-5
DPE keystore, using keytool 13-3to 13-10
HTTP file service, example 13-12
definition GL-3
synchronization
configuration synchronization instruction 4-6
data synchronization instruction 4-6
device configuration 4-6
DPE-RDU 2-4
T
template files, developing
template file definition GL-3
templates
configuration utility
running 5-21
template, adding 5-21
template processing, testing 5-23, 5-24, 5-25
template syntax, validating 5-22, 5-23
constructs
conditionals 5-18
TLS
definition GL-3
tools and advanced concepts
configuration utility
adding template file 5-21
running 5-21
testing template processing 5-23, 5-24, 5-25
validating template file 5-22, 5-23
deviceExport.sh tool 18-1
disk_monitor.sh tool 18-4
keytool utility 13-3
list of tools 9-4
RDU log level tool 19-6to 19-7
current log level, viewing 19-7
setting 19-6
using 19-6
SNMP agent, starting 11-8
SNMP agent, stopping 11-9
SNMP agent community, adding 11-7
SNMP agent community, deleting 11-8
SNMP agent hosts, adding 11-6
SNMP agent hosts, deleting 11-6
SNMP agent location, changing 11-9
SNMP agent settings, displaying 11-10
SNMP contacts, setting up 11-10
SNMP listening port, identifying 11-9
SNMP notification types, specifying 11-10
watchdog agent tool 9-2
TR-069, definition GL-3
Transport Layer Security
troubleshooting
alert messages
DPE 11-2
message format 11-1
RDU alerts 11-2
watchdog process 11-4
devices
configuration history, viewing 8-4
data discovery 12-9
in troubleshooting mode 8-8
recurring faults, viewing 8-7
performance statistics collection
monitoring 11-12
perfstat.log 11-13
runStatAnalyzer.sh tool, using 11-13
server, monitoring 11-11to 11-12
U
unregistered devices 4-8
users
about 16-1
administrator 16-1
managing
adding 16-2
deleting 16-3
modifying 16-3
read-only user 16-2
read-write user 16-2
using BAC
devices, managing
about 16-10
adding 16-11
controls 16-6
deleting 16-12
details, viewing 16-8
modifying 16-11
regenerating instructions 16-12
relating, unrelating 16-13
groups, managing
adding 16-19
deleting 16-20
details, viewing 16-20
modifying 16-20
relating, unrelating 16-20
servers, viewing
DPEs details 16-21
provisioning groups details 16-23
RDU details 16-25
user management
adding a new user 16-2
deleting users 16-3
modifying users 16-3
V
VoIP, definition GL-4
W
watchdog process
agent, definition GL-4
alerts 11-4
command line, using 9-2
Posted: Fri Sep 1 00:11:11 PDT 2006
All contents are Copyright © 1992--2006 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.