Broadband Access Center for Cable Support Tools and Advanced Concepts
This chapter contains information on, and explains the use of, tools that help you maintain Broadband Access Center for Cable (BAC) as well as speed and improve the installation, deployment, and use of this product.
Note This section contains many examples of tool use. In many cases, the tool filenames include a path
specified as <BPR_HOME>. This indicates the default directory location.
Developing Template Files
BAC uses templates to help administrators deploy dynamic PacketCable and DOCSIS files. Using templates, you can create a template file in an easily readable format that you can edit quickly and simply. A template is an ASCII text file that represents the PacketCable or DOCSIS options and values used for generating a valid DOCSIS or PacketCable file. BAC uses the .tmpl file extension to identify template files. You must add template files to the RDU, as an external file using either the administrator's user interface or the API, before any class of service can reference it.
When installing the BAC RDU component, several sample template files are copied to the <BPR_HOME>/samples/templates directory.
Although all that you need to create or edit a template is a simple text editor, before attempting to create your own template file, you should thoroughly familiarize yourself with this information:
BAC provisioning flows
DOCSIS 1.0/1.1 RFI specification
MTA device provisioning specifications
SNMP MIBs for cable devices (for example, DOCS-CABLE-DEVICE-MIB)
Template Grammar
A template is comprised of four different types of statements:
Comments allow you to document your templates. Includes allow you to create building block templates to be used in other templates. Options allow you to specify the DOCSIS or PacketCable type length value (TLV) in a descriptive manner. Table 8-1 describes the available template grammar options.
Comments provide information only and are always located between the pound (#) symbol and the end of a line. Example 8-1 shows example comment usage.
Example 8-1 Example Comment Usage
#
# Template for gold service
#
option 3 1 # enabling network access
Includes
Include files allow for building a hierarchy of similar, but slightly different, templates. This is very useful for defining options that are common across many service classes without having to duplicate the options in several templates.
You can use multiple include statements in a single template although the location of the include statement in the template is significant: the contents of the include file are included wherever the include statement is found in the template. The included template must have been added as an external file to the RDU before it can be used. The included file must not contain any location modifiers such as ../.. because the templates are stored without path information in the RDU database. Examples 8-2 and 8-3 illustrate both correct and incorrect usage of the include option.
Example 8-2 Correct Include Statement Usage
# Valid, including common options
include "common_options.tmpl"
Example 8-3 Incorrect Include Statement Usage
# Invalid, using location modifier
include "../common_options.tmpl"
# Invalid, using incorrect file suffix
include "common_options.common"
# Invalid, not using double quotes
include common_options.tmpl
Options
DOCSIS and PacketCable configuration files consist of properly encoded option id-value pairs. Two forms of options are supported: well defined and custom.
Well-defined options require the option number and value. The value is encoded based on the encoding type of the option number.
Custom options require the option number, explicit value encoding type, and the value.
When using compound options, for example, option 43, you can use the instance modifier to specify the TLV groupings. See the "Instance Modifier" section
for additional information.
When specifying custom options (e.g. option 43), you must specify the encoding type for the option. The available encoding types are:
ASCII— ASCII type encodes any given value as an ASCII string without a NULL terminator. If the value contains spaces, they must be double quoted.
hex—The value must be valid hexadecimal and there must be exactly 2 characters for each octet. If 01 is specified as the value, then exactly one octet is used in the encoding. If 0001 is specified as the value, then exactly two octets are used in the encoding process.
IP address—IP address type encodes any given value as 4 octets. For example, the IP address 10.10.10.1 is encoded as 0A0A0A01.
Use a comma to separate multi valued options on a given line. Each value is treated as such, so you might have to double quote one of the values, but not the others. A good example of a multi valued option is Option 11 (SNMP Varbind). See the "Option 11 (SNMP Varbind)" section
for additional information.
When specifying compound options, there is no need to specify the top level option (for example option 4 when specifying option 4.1). Examples 8-4 and 8-5 illustrate both correct and incorrect usage of the option statement.
Example 8-4 Correct Option Statement Usage
# Valid, specifying the number for well known option 3
option 3 1
# Valid, specifying the number for option 4 sub-option 1
option 4.1 1
# Valid, specifying a vendor option as hex
option 43.200 hex 00000C
Note Enter the custom option in hexidecimal format, without separators such as in 00000C. Unlike
that shown in Example 8-7, the use
of separators, such as in 00-00-0C would be incorrect in this instance.
# Valid, specifying a vendor option as ascii
option 43.201 ascii "enable log"
# Valid, specifying a vendor option as IP
option 43.202 ip 10.4.2.1
Example 8-5 Incorrect Option Statement Usage
# Invalid, using hex with incorrect hex separator
option 43.200 hex 00.00.0C
# Invalid, not using double quotes when needed
option 43.201 ascii enable log
# Invalid, not specifying IP address correctly
option 43.202 ip 10-10-10-1
# Invalid, specifying the description for option "Network Access Control"
option "Network Access Control" 1
# Invalid, specifying top level option
option 4
Instance Modifier
The instance modifier is used to group compound options into Tag-Length-Values (TLVs). Examples 8-6 and 8-7 illustrate both correct and incorrect methods of creating separate TLVs. These are required to enable the IOS DOCSIS modem to interpret the IOS commands as two separate commands.
Example 8-6 Correct IOS Command Line Entries
# Valid, each IOS command gets it's own TLV
option 43.8 instance 1 00-00-0C
option 43.131 instance 1 ascii "login"
option 43.8 instance 2 00-00-0C
option 43.131 instance 2 ascii "password cable"
Example 8-7 Incorrect IOS Command Line Entries
# Invalid, IOS commands are grouped into one TLV
option 43.8 00-00-0C
option 43.131 ascii "login"
option 43.131 ascii "password cable"
# Invalid, using instance on non-compound options
option 3 instance 1 1
Note The encoding type for option 43.8 is an organizationally unique identifier (OUI). Unlike that
shown in Example 8-4, this only
accepts an 00-00-0C format.
Option 11 (SNMP Varbind)
You must use an object identifier (OID), when specifying DOCSIS option 11 or PacketCable option 64. The MIB that contains the OID must be in one of the following MIBs loaded by the RDU. You must specify as much of the OID as needed to uniquely identify it and the name or the number of the OID can be used. The RDU automatically loads these MIBs:
SNMPv2-SMI
SNMPv2-TC
CISCO-SMI
CISCO-TC
SNMPv2-MIB
RFC1213-MIB
IANAifType-MIB
IF-MIB
DOCS-IF-MIB
DOCS-BPI-MIB
CISCO-CABLE-SPECTRUM-MIB
CISCO-DOCS-EXT-MIB
SNMP-FRAMEWORK-MIB
DOCS-CABLE-DEVICE-MIB
DOCS-CABLE-DEVICE-MIB-OBSOLETE
CISCO-CABLE-MODEM-MIB
CLAB-DEF-MIB
PKTC-MTA-MIB
PKTC-SIG-MIB
PKTC-EVENT-MIB
Two versions of the DOCSIS MIB are loaded into the RDU:
# Invalid, docsDevNmAccessStatus is not uniquely identified, its in experimental and
# mib-2 branches
option 11 .docsDevNmAccessStatus.1, Integer, 4
Macro Variables
Macro variables are specified as values in templates and they let you to specify device specific option values. When a macro variable is encountered in the template, the properties hierarchy is searched for the macro variable name and the value of the variable is then substituted. The variable name is a custom property, which is predefined in the RDU, and it must not contain any spaces.
Once the custom property is defined, it can be used in this property hierarchy:
System defaults
Technology defaults, such as DOCSIS and PacketCable
The template parser works bottom up when locating properties in the hierarchy (device first, then the class of service, etc) and converts the template option syntax into. There are three supported syntaxes for macro variables:
${var-name}—This syntax is a straight substitution. If the variable is not found, the parser will generate an error.
${var-name, ignore}—This syntax lets the template parser ignore this option if the variable value is not found in the properties hierarchy.
${var-name, default-value}—This syntax provides a default value if the variable is not found in the properties hierarchy.
Examples 8-10 and 8-11 illustrate both correct and incorrect usage of option 11.
Example 8-10 Correct Macro Variables Usage
# Valid, using macro variable for max CPE's, straight substitution
option 18 ${MAX_CPES}
# Valid, using macro variable for max CPE's, ignore option if variable not found
# option 18 will not be defined in the DOCSIS configuration file if MAX_CPES
# is not found in the properties hierarchy
option 18 ${MAX_CPES, ignore}
# Valid, using macro variable for max CPE's with a default value
option 18 ${MAX_CPES, 1}
# Valid, using macro variable for vendor option
option 43.200 hex ${MACRO_VAR_HEX}
# Valid, using macro variable for vendor option
option 43.201 ascii ${MACRO_VAR_ASCII}
# Valid, using macro variable for vendor option
option 43.202 ip ${MACRO_VAR_IP}
# Valid, using macro variable in double quotes
option 18 "${MAX_CPES}"
# Valid, using macro variable within a value
option 43.131 ascii "hostname ${HOSTNAME}"
# Valid, using macro variables in multi-valued options
# Valid, using macro variable in an include statement
include "${EXTRA_TEMPLATE}"
# Valid, using macro variable in an include statement with a default value
include "${EXTRA_TEMPLATE, modem_reset.tmpl}"
# Valid, using macro variable in an include statement with a default value
include "${EXTRA_TEMPLATE, modem_reset}.tmpl"
# Valid, using macro variable in an include statement with an ignore clause
include "${MY_TEMPLATE, ignore}"
Example 8-11 Incorrect Macro Variables Usage
# Invalid, using macro variable as the option number
option ${MAX_CPES} 1
# Invalid, using macro variable with space in name
option 18 ${MAX CPES}
Encoding Types for Defined Options
Table 8-2 identifies the options with defined encoding types.
Table 8-2 Defined Option Encoding Types
Encoding
Input
Example
Boolean
0 for false and 1 for true.
0
Bytes
A series of hexadecimal octets. Each octet must be exactly 2 characters in length.
000102030405060708
IP Address
Four unsigned integer 8, dot (.) separated.
10.10.10.1
Multiple IP Addresses
Comma separated list of IP addresses.
10.11.12.13,10.11.12.14
MAC Address
Six hexadecimal octets colon (:) or dash (-) separated. Each octet must be exactly 2 characters in length. Colons and dashes must not be mixed.
00:01:02:03:04:05
or
00-01-02-03-04-05
MAC Address And Mask
Twelve octets colon (:) or dash (-) separated. Each octet must be exactly 2 characters in length. Colons and dashes must not be mixed. The first six octets represent the MAC address; the last six represent the mask for the MAC address.
0000:01:02:03:04:05:06:07:08:09:0A:0B:0C
or
00-01-02-03-04-05-06-07-08-09-0A-0B-0C
NVTASCII
An ASCII string. The encoded string will not be NULL terminated.
This is an ASCII string
OIDCF
An SNMP OID string and an unsigned integer (0 or 1) comma separated.
sysinfo.0,1
OUI
Three hexadecimal octets colon (:) or dash (-) separated. Each octet must be exactly 2 characters in length.
00-00-0C
SNMPVarBind
An SNMP OID string, type, and value. Each of these is comma separated. Valid types are:
BITS
Counter
Counter32
Counter64
Gauge
Gauge32
INTEGER
Integer32
IpAddress
OCTETSTRING
OBJECTIDENTIFIER
Opaque
TimeTicks
Unsigned32
Note The OCTETSTRING can be either a string that will be converted to hexadecimal notation without a trailing NULL, octet string for example, or hexadecimal notation contained in single quotes, 'aa:bb:cc' for example.
One unsigned integer 8 and one unsigned integer 16, comma separated.
3,12324
Unsigned integer 8 pair
Two unsigned integer 8, comma separated.
1,3
Unsigned integer 8 triplet
Three unsigned integer 8, comma separated.
1,2,3
ZTASCII
An ASCII string. The encoded string will be NULL terminated.
This is an ASCII string
Defined PacketCable MTA 1.0 Options
Table 8-3 identifies the PacketCable 1.0 MTA options supported by BAC.
Table 8-3 PacketCable MTA 1.0 Options
Number
Description
Encoding
Validation
Multi-valued
11
SNMP MIB Object
SNMPVarBind with 1 byte length
None
True
64
SNMP MIB Object
SNMPVarBind with 2 byte length
None
True
254
Telephony Config File Start/End
Unsigned integer 8
Must be 1 or 255
False
The Configuration File Utility
You use the configuration file utility to test, validate, and view PacketCable 1.0 and DOCSIS 1.0/1.1 template files and configuration files. These activities are critical to successful deployment of individualized configuration files.For more information on templates, please see the "Developing Template Files" section.
The configuration file utility is only available when the RDU is installed and the utility is installed in the <BPR_HOME>/rdu/bin directory.
Both the template file being encoded and the binary file being decoded must reside in the directory from which the configuration file utility is invoked.
All examples found in this section assume that the RDU is operating and that these conditions apply:
The BAC application is installed in the home directory (/opt/CSCObpr).
The RDU login name is admin.
The RDU login password is changeme.
Note Some of the examples provided in this section have been truncated whenever the omitted formation is of
no consequence to the example of its outcome. Instances where this occurs are identified by a series of
periods (...) that are located just prior to the example summary.
In subsequent procedures and examples, the phrase "run the configuration file utility" means to enter the runCfgUtil.sh command from the directory specified. To run the configuration file utility, run this command from the home directory:
runCfgUtil.sh (options)
Where the available (options ) include:
-c <secret>—Specifies the CMTS shared secret when parsing a DOCSIS template file. To specify the default shared secret, enter -c cisco.
-d—Decodes the binary input file. Do not use this with the -e option.
-docsis—Specifies the input file is a DOCSIS configuration file. Do not use this default with the -pkt option.
-e—Encodes the template input file. Do not use this default with the -d option.
-h<host:port>—Specifies the host and port number. The default port number id 49187.
-i <device id>—Specifies the device to use when parsing macro variables. For example, if your device is ID is 1,6,00:00:00:00:00:01, enter -i 1,6,00:00:00:00:00:01. When using this option, you must also use the -u and -p options, respectively, to specify the username and password. Do not use this with the -m option.
-l <filename>—Identifies the input file as being on the local file system. For example, if your input file is called any_file, enter -l any_file. Do not use this with the -r option.
-m <macros>—Specifies key value pairs for macro variables. The format is key=value. If you require multiple macro variables, use a double comma separator between the key value pairs, for example, key_1=value_1,,key_2=value_2. Do not use this with the -i option.
-p <password>—Specifies the password to use when connecting to the RDU. For example, if your password is 123456, enter -p 123456.
-o <filename>—Saves parsed template file as a binary file. For example, if you want the output to be found in a file call op_file, enter -o op_file.
-pkt—Identifies the input file as a PacketCable MTA configuration file. Do not use this with the -docsis option.
-r <filename>—Identifies the input file as an external file that has been added to the RDU. For example, if your file is called file25 enter -r file25. When using this option you must also use the -u and -p options, respectively, to specify the username and password. Do not use this with the -l option.
-s—Displays the parsed template or the contents of the binary file in a human readable format.
-u <username>—Specifies the username to use when connecting to the RDU. For example, if your username is admin, enter -u admin.
Note The configuration file utility does not include option 19 (TFTP server timestamp) and option 20 (TFTP
server provisioned modem address) in the template file, however the BAC TFTP mixing does. Also,
options 6 (CM MIC) and 7 (CMTS MIC) are both automatically inserted into the encoded template file.
Therefore, you do not have to specify these message integrity checks (MIC).
Using the Configuration File Utility
To use the configuration file utility to test BAC templates:
Step 2 Run the configuration file utility on the local file system. If the template contains macro variables, you should perform these operations in the order specified:
a. Test with command line substitution.
b. Test with a device that has been added to your RDU.
Step 3 Add the template (and any included templates that are used) to the RDU.
Step 4 Run the configuration file utility as an external file. If the template contains macro variables, you should perform these operations in the order specified:
a. Test with command line substitution.
b. Test with a device that has been added to your RDU.
Step 5 Configure a class of service to use the template.
Parsing a Local Template File
Usage Guidelines
You use the runCfgUtil.sh command to parse external template files.
Syntax Description
You must use this syntax when using the runCfgUtil.sh command to parse a local template file:
runCfgUtil.sh -pkt -l <file>
Where:
-pkt—identifies the input file as a packetcable MTA file
-l—specifies the input file is on the local file system
<file>—identifies the input template file being parsed
Parsing the File
To parse a template file that is on the local file system:
Step 1 Change directory to /opt/CSCObpr/rdu/samples/packet_cable.
Step 2 Select a template file to use.
Note This example uses an existing template file called unprov_packet_cable.tmpl. The -pkt option is
used because this is a PacketCable MTA template.
Step 3 Run the configuration file utility using this command:
runCfgUtil.sh -pkt -l unprov_packet_cable.tmpl
Where:
-pkt—identifies the input file as a packetcable MTA file
-l—specifies the input file is on the local file system
unprov_packet_cable.tmpl—identifies the input template file being parsed
After running the utility, results similar to these should appear:
0 error(s), 0 warning(s) detected. Parsing of unprov.tmpl was successful.
The file unprov.tmpl was parsed successfully in 375 ms.
The parser initialization time was 63 ms.
The parser parse time was 312 ms.
Parsing a Template File and Adding a User Specified Shared Secret
Usage Guidelines
You use the runCfgUtil.sh command to parse a template file and add a shared secret that you specify.
Syntax Description
You must use this syntax when using the runCfgUtil.sh command to parse a template file and add a shared secret:
runCfgUtil.sh -docsis -l <file> -c <secret>
Where:
-docsis—Identifies the input file as a DOCSIS template file.
-l—Specifies the input file is on the local file system.
<file>—Identifies the input template file being parsed.
-c <secret>—Specifies the CMTS shared secret when parsing a DOCSIS template file. The default shared secret is -c cisco.
Parsing the File
To parse a locally saved template file, and set a user specified shared secret:
Step 1 Change directory to /opt/CSCObpr/rdu/samples/docsis.
Step 2 Select a template file to parse.
Note This example uses an existing template file called unprov.tmpl. The -docsis option is used because this
is a DOCSIS template.
Step 3 Run the configuration file utility using this command:
runCfgUtil.sh -docsis -l unprov.tmpl -c shared
Where:
-docsis—Identifies the input file as a DOCSIS template file.
-l—Specifies the input file is on the local file system. The locally saved file used in this example is unprov.tmp.
-c—Indicates that a shared secret is being set and shared identifies that new shared secret.
After running the utility, results similar to these should appear:
Off
File Bytes
Option
Description
Value
0
030100
3
Network Access Control
Off
3
041F
4
Class of Service
5
010101
4.1
Class ID
1
8
02040001F400
4.2
Maximum Downstream Rate
128000 bits/sec
14
03040000FA00
4.3
Maximum Upstream Rate
64000 bits/sec
20
040101
4.4
Upstream Channel Priority
1
. . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . .
252
06108506547F C9152B44DB95 5420843EF6FE
6
CM MIC Configuration Setting
8506547FC9152B44 DB955420843EF6FE
270
0710644B675B 70B7BD3E09AC 210F794A1E8F
7
CMTS MIC Configuration Setting
644B675B70B7BD3E 09AC210F794A1E8F
288
FF
255
End-of-Data Marker
289
00
0
PAD
290
00
0
PAD
291
00
0
PAD
0 error(s), 0 warning(s) detected. Parsing of unprov.tmpl was successful. The file unprov.tmpl was parsed successfully in 375 ms. The parser initialization time was 63 ms. The parser parse time was 312 ms.
Specifying Macro Variables at the Command Line
Usage Guidelines
You use the runCfgUtil.sh command to specify macro variables.
Syntax Description
You must use this syntax when using the unCfgUtil.sh command when specifying macro variables at the command line:
runCfgUtil.sh -l <file> -m <"key_value_pairs">
Where:
-l—Specifies the input file is on the local file system.
<file>—Identifies the input template file being parsed.
-m—Identifies the username to use when connecting to the RDU.
<"key_value_pairs">—Identifies the key value pairs for macro variables. When multiple macro variables are required, a double comma separator is inserted between the key value pairs.
To specify values for macro variables at the command line:
Step 1 Change directory to /opt/CSCObpr/rdu/samples/templates.
Step 2 Select a template file to use.
Step 3 Identify the macro variables in the template. In this example, the macro variables are macro1 (option 3) and macro11 (option 4.2).
Step 4 Identify the values for the macro variables. The value for macro1 will be set to 1, and the value for macro11 to 64000.
Step 5 Run the configuration file utility using this command:
macro1=1,,macro11=64000—Identifies the key value pairs for macro variables. Since multiple macro variables are necessary, a double comma separator is inserted between the key value pairs.
After running the utility, results similar to these should appear:
-l—specifies the input file is on the local file system
<file>—identifies the input template file being parsed
-i—specifies the device to use when parsing macro variables
<MAC>—identifies the MAC address of the device
-u <username>—specifies the username to use when connecting to the RDU
-p <password>— specifies the password to use when connecting to the RDU
To specify a device to be used for macro variable substitution:
Step 1 Change directory to /opt/CSCObpr/rdu/samples/templates.
Step 2 Select a template file to use. This example will use the existing template file, macro.tmpl.
Step 3 Identify the macro variables in the template. In this example, the macro variables are macro1 (option 3) and macro11 (option 4.2).
Step 4 Identify the device to use. This example will assume that the device exists in the RDU and has the macro variables set as properties. The value for macro1 will be set to 1, and the value for macro11 to 64000.
Step 5 Run the configuration file utility using this command:
0 error(s), 0 warning(s) detected. Parsing of unprov.tmpl was successful.
The file unprov.tmpl was parsed successfully in 375 ms.
The parser initialization time was 63 ms.
The parser parse time was 312 ms.
The RDU Log Level Tool
You use the RDU log level tool to change the current log level of the RDU (on a local computer) from the command line. Although this tool is only available in an RDU installation, it is located in the <BPR_HOME>/rdu/bin directory. Table 8-4 identifies the available log levels and the types of message written to the log file when enabled.
Table 8-4 Logging Levels
Log Level
Description
Emergency
System unstable.
Alert
Immediate action needed.
Critical
Critical conditions exist.
Error
Error conditions exist.
Warning
Warning conditions exist.
Notification
This is a normal, but significant, condition.
Information
This is used only for informational messages.
Cisco recommends that you keep the RDU logging level at the Warning level to help maintain a steady operations state. The Information level is recommended if you need to maintain steady state performance during debug operations. You should however, exercise caution when running with the Information level set because this creates a great number of log entries which in itself can adversely impact performance.
Using the RDU Log Level Tool
All examples assume that the user name for the RDU is admin, the password for the RDU is changeme, and the RDU is running.
You can use this tool to change the logging level from one value to any other value. The following example illustrates how to set the RDU logging level to the warning level, as indicated by the number 4 in the setLogLevel.sh command. The actual log level set is not important for the procedure, it can be interchanged as required.
To set the RDU logging level:
Step 1 Change directory to <BPR_HOME>/rdu/bin.
Step 2 Run the RDU log level tool using this command:
setLogLevel.sh 4
This prompt appears:
Please type RDU username:
Step 3 Enter the RDU username at the prompt. In this example, the default username (admin) is used.
Please type RDU username: admin
This prompt appears:
Please type RDU password:
Step 4 Enter the RDU password for the RDU at the prompt. In this, example the default password (changeme) is used.
Please type RDU password: changeme
This message appears to notify you that the log level has been changed. In this example, the level was 5, for notification, and is now 4, for warning.
RDU Log level was changed from 5 (notification) to 4 (warning).
Viewing the RDU's Current Log Level
You can use this tool to view the RDU log and determine which logging level is configured before attempting to change the value. This procedure illustrates how to use the tool to view the RDU's current logging level, and assumes that you have a computer already connected to the RDU.
To view the RDU's current logging level:
Step 1 Change directory to <BPR_HOME>/rdu/bin.
Step 2 Run this command:
setLogLevel.sh -show
This prompt appears:
Please type RDU username:
Step 3 Enter the RDU username (admin) and press Enter.
Please type RDU username: admin
This prompt appears:
Please type RDU password:
Step 4 Enter the RDU password (changeme) and press Enter.
Please type RDU password: changeme
This message appears:
The logging is currently set at level: 4 (warning)
All tracing is currently disabled.
Managing KDC Certificates with the PKCert Tool
The PKCert tool is used to install, and then manage, the KDC certificates that are required by the KDC for its operation. This tool takes the CableLabs service provider certificates that you obtain and converts them into the series of certificate files, similar to those shown below, that the KDC needs to operate.
Cablelabs_Service_Provider_Root.cer
Service_Provider.cer
Local_System.cer
KDC.cer
This tool also allows you to verify certificate chains and copy and rename a certificate chain to the names required by the KDC.
Note This tool is only available for use when the KDC component is installed.
Running the PKCert Tool
Run the PKCert tool by executing this command, the default location of which is in the <BPR_HOME>/kdc directory:
PKCert.sh [function] [option]
Where:
[function]—identifies which function will be performed. For example, enter one of these switches to choose the appropriate function:
Note If you encounter difficulty using any of these options, you can specify a -? option to display all
available help information on your computer screen.
[option]—Implements optional functions that are dependent on the function selected above.
When you run the PKCert command, it will print a list of all errors encountered while performing the requested activities. You can use this printout to troubleshoot any problems that may have occurred.
Creating a KDC Certificate
Enter this command, from the /opt/CSCObpr/kdc directory, to create the KDC certificate:
-c <Cert File>—uses the service provider certificate (DER encoded)
-d <directory>—specifies the destination directory
-k <Key File>—uses the service provider private key (DER encoded)
-n <Serial#>—set the certificate serial number
-o—overwrite existing files
-r <Realm>—specifies the Kerberos realm for KDC certificate
-s <directory>—specifies the source directory
When a new certificate is created and installed, the new certificate identifies the realm in the subject alternate name field. The new certificate is unique to its current environment in that it contains:
The KDC realm
The DNS name associated with this KDC that the MTA will use. For example:
Using this command creates the files /opt/CSCObpr/kdc/solaris/packetcable/certificates/KDC.cer and /opt/CSCObpr/kdc/solaris/packetcable/certificates/KDC_private_key.pkcs8. The KDC certificate will have a realm set to PCTEST.CISCO.COM, a serial number set to 100, and the KDC server's FQDN is set to kdc.pctest.cisco.com.
Note A console message is displayed after the successful completion of the command indicating that the file
/opt/CSCObpr/kdc/solaris/packetcable/certificates/KDC_private_key.pkcs8 must be copied to
/opt/CSCObpr/kdc/solaris/KDC_private_key.pkcs8. The command line option -o tells the utility that it
should overwrite any pre-existing files.
Validating the KDC Certificates
This command examines all files in the source directory specified and attempts to identify them as X.509 certificates. If legitimate X.509 certificates are found, the files are properly renamed and copied to the destination directory. An error is generated whenever more than one legitimate chain of certificates for a particular purpose (service provider or device) is identified. If this occurs, you must remove the extra certificate from the source directory and run the command again.
Note Usage instructions for PKCert are displayed on the screen when you enter the PKCert.sh -v -?
command.
Enter this command, from the /opt/CSCObpr/kdc directory, to validate the KDC certificate:
PKCert.sh -v -s <dir> -d <dir> -o -r <dir>
Where:
-s <directory>—specifies the source directory
-d <directory>—specifies the destination directory
-o—overwrites any existing files
-r <directory>—specifies the reference certificate directory
Verification is performed against reference certificates built into this package. If the '-d' option is specified then certificate(s) are installed in the target directory with name normalization. For example:
Changing NR Extensions with the NR Extensions Properties Tool
The BAC installation program establishes values for configuration properties used by BAC extensions that are incorporated into the Network Registrar DHCP server. You use the changeNRProperties.sh command, which is found in the <BPR_HOME>/cnr_ep/bin directory, to change key configuration properties.
Invoking the script without any parameters will display a help message listing the properties that can be set.
To run this command:
Step 1 Change directory to <BPR_HOME>/cnr_ep/bin.
Step 2 Run the changeNRProperties.sh command:
changeNRProperties.sh <options>
Where <options> can include:
-help—Displays this help message. The -help option must be used exclusively. Do not use this in conjunction with any other option.
-e <enable|disable>—Sets the PacketCable enable property. For example, enter -e enable to enable the property, and -e disable to disable it.
-d—Displays the current properties. The -d option must be used exclusively. Do not use this in conjunction with any other option.
-s <secret>—Identifies the BAC shared secret. For example, enter -s secret, if the shared secret is the word secret.
-f <fqdn>—Identifies the RDU's FQDN. For example, enter -f rdu.cisco.com, if you use rdu.cisco.com as the fully qualified domain name.
-p <port>—Identifies the RDU port you want to use. For example, enter -p 49187, if you wanted to use port number 49187.
-r <realm>—Identifies the PacketCable realm. For example, enter -r CISCO.COM, if your PacketCable realm is CISCO.COM.
Note The realm must be entered in uppercase letters.
-g <prov group>—Identifies the provisioning group. For example, enter -g group1, if you are using provisioning group called group1.
-t <00|01>—Identifies whether or not the PacketCable TGT is set to off or on. For example, enter -t 00 to set this to off, or -t 01 to set it to on.
-a <ip>—Identifies the PacketCable primary DHCP server address. For example, enter -a 10.10.10.2 if the IP address of your primary DHCP server is 10.10.10.2.
-b <ip>—Identifies the PacketCable secondary DHCP server address. For example, enter -b 10.10.10.4, if the IP address of your secondary DHCP server is 10.10.10.4. You can also enter -b null to set a null value, if appropriate.
-y <ip>—Identifies the PacketCable primary DNS server address. For example, enter -y 10.10.10.6], if the IP address of the PacketCable primary DNS server is 10.10.10.6.
-z <ip>—Identifies the PacketCable secondary DNS server address. For example, enter -z 10.10.10.8, if the IP address of your secondary DNS server is 10.10.10.8. You can also enter -z null to set a null value, if appropriate.
Step 3 Restart the DHCP server.
Examples
This is an example of changing the Network Registrar extensions with the NR Extensions Properties tool:
The keygen tool is used to generate PacketCable service keys. The service keys are symmetric triple data encryption standard (triple DES or 3DES) keys (shared-secret) required for KDC communications. The KDC server requires service keys for each of the DPE's provisioning FQDNs.
The KDC server reads the service keys on startup. Any modification to the service keys requires the KDC server to be restarted. Any changes made to the DPE provisioning FQDN through the DPE CLI mandates a corresponding change to the KDC service key filename. This applies since the KDC service key uses the DPE provisioning FQDN as part of its filename.
This tool, which is located in the <BPR_HOME>/kdc directory, uses command-line arguments for the DPE provisioning FQDN, realm name, and a password and generates the service key files.
Syntax Description
You must use this syntax when using the Keygen tool:
keygen [options] <fqdn> <realm> <password>
Where options include:
-?—Displays this usage message and exits the command.
-v, -version—Displays the version of this tool and exits the command.
-q, -quiet—Implements a quiet mode whereby no output is created.
-c, -cms—Creates a service key for the CMS system.
<fqdn>—Identifies the DPE's fully qualified domain name and is a required entry.
<realm>—Identifies the Kerberos realm and is a required entry.
<password>—Specifies the password to be used. This is also a required field. The password must be between 6 and 20 characters in length. For example:
Three service key files are written in KDC keys directory using this filename syntax:
mtafqdnmap,<fqdn>@<REALM>
mtaprovsrvr,<fqdn>@<REALM>
krbtgt,<REALM>@<REALM>
The service key file always contains a version field of 0x0000.
Examples
This example illustrates the generation of generating service keys used for KDC to DPE communications. Enter this command:
When this command is implemented, this CMS service key is written to the <BPR_HOME>/kdc/solaris/keys directory.
cms,cms-fqdn.com@CMS-REALM-NAME
Note You enter the same password, when running this tool, used for the packetcable registration
kdc-service-key command. See the
"packetcable registration kdc-service-key"
section for additional information.
Using the rduSnmpAgent.sh Command
You can use the rduSnmpAgent.sh command to manage the RDU SNMP agent. Using this command, which is located in the <BPR_HOME>/rdu/snmp/bin directory, you can add (or remove) your host to a list of other hosts that receive SNMP traps, and start and stop the RDU agent process. This command should be run from the local directory.
Note The RDU SNMP agent default port number is 8001.
This command adds the host address to the list of hosts that receive SNMP traps from the RDU SNMP agent.
Syntax Description
To add a host:
> rduSnmpAgent.shadd host <host-addr> community <community> [udp-port <port>]
Where:
<host-addr>—specifies the IP address of the host that you want to add to the list of hosts
<community>—specifies the community (read or write) to be used while sending SNMP traps
<port>—identifies the UDP port used for sending the SNMP traps
Examples
This example shows how to use the rduSnmpAgent.sh command to add a host:
> rduSnmpAgent.sh add host test.cisco.com community trapCommunity udp-port 162
OK
Please restart [stop and start] RDU SNMP agent.
Deleting a Host from the RDU SNMP Agent
You can remove a host from the list of those receiving SNMP traps from the RDU SNMP agent.
Syntax Description
To delete a host:
rduSnmpAgent.shdelete host <host-addr>
Where:
<host-addr>—Specifies the IP address of the host that you want to delete from the list of hosts.
Examples
This example shows how to use the rduSnmpAgent.sh command to delete a host:
> ./rduSnmpAgent.sh delete host test.cisco.com
OK
Please restart [stop and start] RDU SNMP agent.
Adding an RDU SNMP Agent Community
You can add a SNMP community string to allow access to the RDU SNMP agent.
Syntax Description
To add the community string:
rduSnmpAgent.sh add community string[ro | rw]
Where:
<string>—Identifies the SNMP community.
<ro>—Assigns a read only (ro) community string. Only get requests (queries) can be performed. The ro community string allows Get requests, but no Set operations. The NMS and the managed device must reference the same community string.
<rw>—Assigns a read write (rw) community string. SNMP applications require RW access for Set operations. The rw community string enables write access to OID values.
Note The default ro and rw community strings are bprread and bprwrite respectively. Cisco
recommends that you change these values before deploying BAC.
Examples
This example shows how to add an RDU SNMP agent community string:
> rduSnmpAgent.sh add community fsda54 ro
OK
Please restart [stop and start] RDU SNMP agent.
Deleting an RDU SNMP Agent Community
You can delete a SNMP community string to prevent access to the RDU SNMP agent.
Syntax Description
You must use this syntax to delete the community string:
This example shows how to delete an RDU SNMP agent community string:
> rduSnmpAgent.sh delete community fsda54 ro
OK Please restart [stop and start] RDU SNMP agent.
Starting the RDU SNMP Agent
This command starts the SNMP agent process on the RDU.
Syntax Description
To start the RDU SNMP agent process:
rduSnmpAgent.sh start
Stopping the RDU SNMP Agent
This command stops the SNMP agent process on the RDU.
Syntax Description
To stop the RDU SNMP agent process:
rduSnmpAgent.sh stop
Monitoring Available Disk Space
Monitoring available disk space is an important system administration task and you can use any number of custom written scripts or commercially available tools to do so.
The disk_monitor.sh command, located in the <BPR_HOME>/rdu/sample/tools directory, sets threshold values for one or more file systems. When these thresholds are surpassed, an alert is generated through the Solaris syslog facility, at 60 second intervals, until additional disk space is available.
Note Cisco recommends that, at a minimum, you use the disk_monitor.sh script to monitor the <BPR_DATA>
and <BPR_DBLOG> directories.
To monitor available disk space:
# ./disk_monitor.sh (file system-directory) (x)
Where:
(file system-directory)—identifies any directory, in a file system, to monitor.
(x)—identifies the percentage threshold applied to the specified file system
Examples
Assume that you want to be notified when a file system (/var/CSCObpr for example) with database logs reaches 80% of its capacity. Enter the command using this syntax:
# ./disk_monitor.sh /var/CSCObpr 80
When the database logs disk space reaches 80% capacity, an alert similar to that shown below, is sent to the syslog file:
Dec 7 8:16:03 perf-u80-1 BPR: [ID 702911 local6.warning] File system /var/bpr usage is 81% (threshold is 80%)