cc/td/doc/product/rtrmgmt/bac/bac30
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table Of Contents

A - B - C - D - F - G - I - K - L - N - O - P - R - S - T - U - V - W -

Index

A

ACS

definition GL-1

URL, configuring 3-8

URL, discovery 2-5

administrator user interface

accessing 15-2

ACS URL, configuring 3-8

BAC architecture, and 9-3

configuring 15-1

connection request 12-4

device's provisioning group, correcting 14-7

device faults, viewing 8-7

device history, configuring 8-4

icons (table) 15-5

logging in 15-2

HTTP transport 15-3

SSL transport 15-3

logging out 15-5

parameter dictionaries, managing 7-5

adding 7-5

deleting 7-6

replacing 7-6

viewing 7-6

performance statistics, collecting

enabling, disabling 11-12

server, monitoring 11-11

advanced concepts

See tools and advanced concepts

agent, SNMP

BAC architecture, and 9-4

MIB support 11-5

alert messages 11-1to 11-4

alerts, definition GL-1

message format 11-1

relating to

DPE 11-2

RDU 11-2

watchdog process 11-4

API, definition GL-1

architecture 2-1to 2-7

about DPEs 2-3

about provisioning groups 2-5

about RDU 2-3

administrator user interface 9-3

agents

SNMP 9-4

watchdog process agent 9-2

command line interface 9-3

deployment 2-1

logging 19-2to 19-3

overview 2-2

watchdog process 2-6

audit logs, definition GL-1

authentication

about 13-13

available options 13-17

client certificate, configuring 13-16

external client certificate, configuring 13-16

shared secret, configuring 13-13

autoconfiguration server

See ACS

B

backup and recovery of database 10-4to 10-6

C

caching, definition GL-1

cautions

regarding

custom properties, deleting 17-5

disk space requirement figures 10-3

network deployment with an evaluation license key 17-16

template files, deleting 17-15

troubleshooting devices 8-9

significance of xix

cipher suites

definition GL-1

Cisco 11500 Content Services Switch

See Cisco CSS

Cisco CSS, configuring 12-13

classes of service

about 4-3

configuring

adding 17-3

deleting 17-4

modifying 17-3

client certificate authentication

configuring 13-16

overview 13-1

command line interface

DPE, accessing 9-3

configuration history

See device history

configuration template

about 5-1

administrator user interface, using 17-11to 17-15

authoring 5-12

conditionals, using 5-17

includes, using 5-15

parameter substitution, using 5-14

configuration utility

about 5-20

template, adding 5-21

template processing, testing 5-23, 5-24, 5-25

template syntax, validating 5-22, 5-23

using 5-21

features 5-3

access control 5-8

notification 5-7

parameters 5-5to 5-6

parameters, schema (figure) 5-5

prerequisites 5-8to 5-12

prerequisites, schema (figure) 5-9

schema (figure) 5-3

template processing files (table) 5-2, 6-3

configuration workflows and checklists

component workflows

DPE checklist (table) 3-2

RDU checklist (table) 3-1

technology workflows

DPE configuration (tables) 3-5

provisioning group configuration 3-7

RDU configuration (table) 3-3

RDU configuration, preregistering device data 3-4

configuring BAC

class of service

adding 17-3

deleting 17-4

modifying 17-3

connection requests 12-2

authentication 12-3

disabling 12-6

methods, discovered 12-4

methods, use FQDN 12-4, 12-5

methods, use IP 12-4, 12-5

reachability 12-6

custom properties 17-5to 17-6

CWMP service

DPE ports 12-2

defaults

configuration options, selecting 17-6

CWMP 17-7

RDU 17-9

system 17-10

device history

enabling, disabling 8-4

number of entries 8-5

viewing 8-4

discovering device data

about 12-7

parameters 12-8

files, managing

adding 17-13

deleting 17-15

exporting 17-15

replacing 17-14

viewing 17-14

license keys 17-16to 17-17

adding a license 17-16

modifying a license 17-16

provisioning data, publishing

Datastore changes 17-19

plug-in settings, modifying 17-19

RDU extensions, managing

custom extension points, installing 17-18

new class, writing 17-17

viewing 17-18

connection request service

about 12-2

authentication 12-3

disabling 12-6

methods 12-4to 12-6

discovered 12-4

use FQDN 12-5

use IP 12-5

reachability 12-6

workflow (figure) 12-3

CPE management

authentication 13-13

available options 13-17

client certificate, configuring 13-16

external load balancer, configuring 13-16

shared secret, configuring 13-13

device assignment to provisioning groups 4-11

automatic 4-11

explicit 4-11

explicit and automatic approach 4-12

device configuration synchronization 4-6

device deployment options 4-8

preregistered 4-8

unregistered 4-8

discovering CPE parameters 4-4

default parameters (table) 4-5

instruction generation, and 4-5

overview 4-1

See also device management

customer premises equipment, definition GL-1

custom properties

configuring 17-5

overview 5-13

CWMP

about 1-3

definition GL-1

CWMP service, configuring

about authentication 13-1

connection request 12-2

authentication 12-3

disabling 12-6

method, discovered 12-4

method, use FQDN 12-4, 12-5

method, use IP 12-4, 12-5

reachability 12-6

discovering device data

about 12-7

parameters 12-8

troubleshooting 12-9

DPE keystore, using keytool 13-3

certificates for client authentication, importing 13-10

certificate signing request, generating 13-7

existing signed server certificate, importing 13-4

keytool commands 13-5

self-signed certificate, displaying 13-7

server certificate and private key, generating 13-6

signed certificate, verifying 13-8

signed certificate into server certificate, importing 13-9

signing authority certificate into cacerts, importing 13-8

DPE ports 12-2

security

about 13-1

key and certificate management 13-2

SSL, configuring 13-3

D

database management

backup and recovery

backing up 10-4

recovering 10-5

restoring 10-6

disk space requirements 10-3to 10-4

caution regarding 10-3

handling out 10-3

failure resiliency, understanding 10-1to 10-2

files 10-2to 10-3

automatic log management 10-3

DB_VERSION 10-3

history log 10-3

storage 10-2

transaction log 10-2

location, changing 10-6to 10-7

defaults, configuring

CWMP 17-7

RDU 17-9

system 17-10

device diagnostics

configuration history, viewing 8-4

overview 4-12

performance statistics, monitoring 11-12

runStatAnalyzer.sh tool, using 11-13

Device Export

deviceExport.sh tool, using 18-1

device faults

about 8-6

device history

about 8-1

enabling, disabling 8-4

number of entries, configuring 8-5

records, logging 8-5

supported records (table) 8-1

viewing 8-4

device management

about 16-10

administrator user interface, using

adding 16-11

deleting 16-12

devices menu 16-4

displaying live data 16-16

forcing configuration synchronization 16-17

forcing firmware upgrade 16-17

modifying 16-11

performing a Ping test 16-16

rebooting 16-15

regenerating instructions 16-12

relating, unrelating 16-13

requesting a connection 16-15

resetting to factory settings 16-15

searches supported (table) 16-5

setting operations timeout 16-17

controls 16-6

device details, viewing 16-8

Manage Devices page 16-4

searching for devices 16-8

See also CPE management

device object model

overview 4-1

relationships (figure) 4-2

relationships (table) 4-3

device operations

about 14-1

conditional execution 14-5

connection modes

immediate 14-2

immediate workflow (figure) 14-3

on-connect 14-3

on-connect workflow (figure) 14-4

device's provisioning group, managing 14-5

correcting 14-6

redirecting 14-5

sample files, accessing 14-1

supported operations (table) 14-2

device troubleshooting

about 8-8

configuring 8-9

disabling 8-10

enabling 8-9

troubleshooting log, viewing 8-11

viewing devices in troubleshooting mode 8-10

log entries 8-11

discovered connection request 12-4

disk space, monitoring

disk space monitoring

disk_monitor.sh tool, using 18-4

documentation

audience xvii

organization xviii

related to this product xx

typographical conventions xix

DPE (Device Provisioning Engine)

about 2-3

alert messages 11-2

command line interface 9-3

component workflow checklist (table) 3-2

definition GL-2

device faults 8-6to 8-8

dpe.log file, viewing 19-8

keystore configuring, using keytool 13-3

certificates for client authentication, importing 13-10

certificate signing request, generating 13-7

existing signed server certificate, importing 13-4

self-signed certificate, displaying 13-7

server certificate and private key, generating 13-6

signed authority certificate into cacerts, importing 13-8

signed certificate into server certificate, importing 13-9

license keys 2-4

load balancing

Cisco CSS, configuring 12-13to 12-19

DNS round robin, using 12-11

hardware load balancer, using 12-12

performance statistics, collecting 11-12

runStatAnalyzer.sh tool, using 11-13

ports, configuring 12-2

RDU synchronization 2-4

server, monitoring 11-11

SSL

about 13-11

authentication options 13-17

configuring 13-11

configuring CWMP service, example 13-12

configuring HTTP file service, example 13-12

defaults (table) 13-11

device authentication, configuring 13-13

states 2-5

technology workflow checklist

CWMP service (table) 3-6

HTTP file service (table) 3-7

viewing

currently registered DPEs 16-21

F

firmware

about 6-1

files, managing

administrator user interface, using 17-11to 17-15

file service 6-4

firmware image 6-4

firmware rules template 6-4

firmware rules template

authoring 6-6

constructs 6-11to 6-13

expressions 6-6

internal, external files 6-9

sample 6-10

management mechanisms 6-1to 6-4

direct firmware 6-4

policy based 6-2

upgrade

bypassing, example 6-13

forcing 16-17

FQDN

definition GL-2

use FQDN, connection request 12-5

G

group, managing

group types

deleting 16-19

groups, managing

about 16-19

adding 16-19

deleting 16-20

details, viewing 16-20

group types 16-18

adding 16-18

modifying 16-19

modifying 16-20

relating, unrelating groups 16-20

GUI (see administrator user interface)

I

icons, administrator user interface (table) 15-5

instructions

generation, definition GL-2

generation and processing overview 4-5

IP address

definition GL-2

use IP, connection request 12-5

K

key, certificate management 13-2

keystore

about cacerts 13-2

about server certificates 13-2

configuring, using keytool 13-3

certificates for client authentication, importing 13-10

certificate signing request, generating 13-7

self-signed certificate, displaying 13-7

server certificate and private key, generating 13-6

signed certificate, verifying 13-8

signed certificate into server certificate, importing 13-9

signing authority certificate into cacerts, importing 13-8

keytool commands, using 13-5

sample server certificates 13-3

L

license keys, managing 17-16to 17-17

adding a license 17-16

DPE licensing 2-4

modifying a license 17-16

load balancing

Cisco CSS, configuring 12-13

logging

about 2-7

BAC architecture, and 19-2to 19-3

log file, sample 19-4

log files, rotating 19-4

log levels, configuring 19-4

log levels and structures 19-3

log level tool 19-6

current log level, viewing 19-7

setting 19-6

using 19-6

viewing log files

audit.log 19-5

dpe.log 19-8

perfstat.log 11-13

rdu.log 19-5

troubleshooting.log 8-11

logging into BAC 15-2

N

NAT, definition GL-2

network address translation

See NAT

Network Time Protocol, definition GL-2

notes

significance of xix

O

overview

about BAC 1-1to 1-3

configuration management 1-1

device diagnostics and troubleshooting 4-12

features and benefits 1-1

firmware management 1-2

scalability 1-2

security 1-2

technology supported 1-3

P

parameter dictionary 7-1to 7-7

administrator user interface, using 7-5

adding 7-5

deleting 7-6

replacing 7-6

viewing 7-6

custom 7-3

default 7-2

overview 7-1

schema (figure) 7-2

syntax 7-3

preregistered devices 4-8

preregistering device data 3-4

property hierarchy 4-4

provisioning API, definition GL-3

provisioning data, publishing

Datastore changes 17-19

plug-in settings, modifying 17-19

provisioning flows

initial configuration

preregistered devices 4-10

unregistered devices 4-10

initial configuration (figure) 4-9

provisioning groups

about 2-5

ACS URL, configuring 3-8

adding a DPE 12-12

definition GL-3

device faults, viewing 8-7

devices, assigning 4-11

automatic 4-11

explicit 4-11

explicit and automatic 4-12

redundancy 12-10

Cisco CSS, configuring 12-13

Cisco CSS, using 12-13

DNS round robin, using 12-11

hardware load balancer, using 12-12

local 12-11

regional 12-11

scalability 12-10

technology workflow 3-7

publishing, definition GL-3

R

RDU (Regional Distribution Unit)

about 2-3

alerts 11-2

component workflow checklist (table) 3-1

definition GL-3

details, viewing 16-25

device faults 8-6to 8-8

DPE synchronization 2-4

extensions, managing

custom extension points, installing 17-18

new class, writing 17-17

viewing 17-18

log level tool 19-6to 19-7

current log level, viewing 19-7

setting 19-6

using 19-6

performance statistics, collecting 11-12

runStatAnalyzer.sh tool, using 11-13

server, monitoring 11-11

technology workflow checklist (table) 3-3

recurring faults

See device faults

redundancy

local 12-11

regional 12-11

redundancy, definition GL-3

S

schema (figures)

configuration 5-3

parameter 5-5

parameter dictionary 7-2

prerequisite 5-9

Secure Sockets Layer

See SSL

security

See CWMP service, configuring

server, monitoring

DPE

administrator user interface, using 11-11

CLI, using 11-12

performance statistics collection

monitoring 11-12

perfstat.log, understanding 11-12

runStatAnalyzer.sh tool, using 11-13

RDU

administrator user interface, using 11-11

SNMP agent 11-4

servers, viewing 16-21to 16-28

DPEs 16-21

RDU details 16-25

service classes

See classes of service

shared secret

configuring 13-13

device password, changing 13-14

device password, correcting 13-15

definition GL-3

SNMP agent

about 2-6

MIB support 11-4

snmpAgentCfgUtil.sh tool

community, adding 11-7

community, deleting 11-8

contacts, setting up 11-10

hosts, adding 11-6

hosts, deleting 11-6

listening port, identifying 11-9

location, changing 11-9

notification types, specifying 11-10

settings, displaying 11-10

starting 11-8

stopping 11-9

SSL

configuring 13-3, 13-11

CWMP service, example 13-12

DPE keystore, keytool commands (table) 13-5

DPE keystore, using keytool 13-3to 13-10

HTTP file service, example 13-12

definition GL-3

synchronization

configuration synchronization instruction 4-6

data synchronization instruction 4-6

device configuration 4-6

DPE-RDU 2-4

T

template files, developing

template file definition GL-3

templates

configuration 5-1to 5-12

configuration utility

running 5-21

template, adding 5-21

template processing, testing 5-23, 5-24, 5-25

template syntax, validating 5-22, 5-23

constructs

conditionals 5-18

firmware rules 6-2to 6-4

authoring 6-6to 6-11

constructs 6-11to 6-13

TLS

definition GL-3

See SSL

tools and advanced concepts

configuration utility

adding template file 5-21

running 5-21

testing template processing 5-23, 5-24, 5-25

validating template file 5-22, 5-23

deviceExport.sh tool 18-1

disk_monitor.sh tool 18-4

keytool utility 13-3

list of tools 9-4

RDU log level tool 19-6to 19-7

current log level, viewing 19-7

setting 19-6

using 19-6

snmpAgentCfgUtil.sh tool

SNMP agent, starting 11-8

SNMP agent, stopping 11-9

SNMP agent community, adding 11-7

SNMP agent community, deleting 11-8

SNMP agent hosts, adding 11-6

SNMP agent hosts, deleting 11-6

SNMP agent location, changing 11-9

SNMP agent settings, displaying 11-10

SNMP contacts, setting up 11-10

SNMP listening port, identifying 11-9

SNMP notification types, specifying 11-10

watchdog agent tool 9-2

TR-069, definition GL-3

Transport Layer Security

See TLS

troubleshooting

alert messages

DPE 11-2

message format 11-1

RDU alerts 11-2

syslog 11-1to 11-4

watchdog process 11-4

devices

configuration history, viewing 8-4

data discovery 12-9

in troubleshooting mode 8-8

recurring faults, viewing 8-7

performance statistics collection

monitoring 11-12

perfstat.log 11-13

runStatAnalyzer.sh tool, using 11-13

server, monitoring 11-11to 11-12

U

unregistered devices 4-8

users

about 16-1

administrator 16-1

managing

adding 16-2

deleting 16-3

modifying 16-3

read-only user 16-2

read-write user 16-2

users, managing 16-1to 16-3

using BAC

devices, managing

about 16-10

adding 16-11

controls 16-6

deleting 16-12

details, viewing 16-8

modifying 16-11

regenerating instructions 16-12

relating, unrelating 16-13

groups, managing

adding 16-19

deleting 16-20

details, viewing 16-20

modifying 16-20

relating, unrelating 16-20

servers, viewing

DPEs details 16-21

provisioning groups details 16-23

RDU details 16-25

user management

adding a new user 16-2

deleting users 16-3

modifying users 16-3

V

VoIP, definition GL-4

W

watchdog process

about 2-6, 9-1

agent, definition GL-4

alerts 11-4

command line, using 9-2


hometocprevnextglossaryfeedbacksearchhelp

Posted: Fri Sep 1 00:11:11 PDT 2006
All contents are Copyright © 1992--2006 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.