7 network information, 8 security, 9 configuration file choices – Alpha Technologies XP-EDH4 - Technical Manual User Manual
Page 13

13
745-419-B0-001 Rev. A (11/2013)
1.7 Network Information
The following worksheet will aid you in gathering the network information you will need as you move
through the deployment process.
1.0
Introduction, continued
Network Item
Value
Cable Modem MAC address
Cable Modem IP address
TFTP Server IP address
Provisioning Server IP address
Time of Day Server IP address
DHCP Server IP address
1.8 Security
Different security methods are used to ensure network integrity. Some common issues are:
• A subscriber account (where the transponder is the subscriber) may be required for each
transponder
• The transponder’s MAC address may have to be pre-loaded into the CMTS
• MAC filtering may have to be modified to allow MAC addresses starting with 00:10:3F:xx:xx:xx or
00:26:97:xx:xx:xx to be registered
• For SNMP access, UDP ports 161 and 162 must not be blocked
• Firewalls must allow communications between the cable modem and the various servers.
1.9 Configuration File Choices
Alpha strongly recommends that the cable modem configuration file has been successfully modified and
tested prior to deploying transponders into the system in quantity. The transponder manages SNMP filters
and trap destinations via the docsDevNmAccessTable.
To ensure the proper management of SNMP access, such as limiting access to specific SNMP managers
or allowing the transponder to send SNMP/HMS traps, the docsDevNmAccessTable must be populated
via the cable modem configuration file.
Additional SNMP Object Identifiers (OIDs) may be added to further configure other options such as the
transponder's HTTP port, its User Name and Password configuration information.
For Dual IP configuration, refer to
Section 6.0, Dual IP Configuration.
The deployment of an EDH4 DOCSIS-based transponder is similar to provisioning a standard subscriber
cable modem or Multimedia Terminal Adapter (MTA) with certain exceptions owing to the transponder
being a system support device. For instance, care must be used when provisioning, such that it is not
invoiced in the billing system or mistakenly blocked. Cable operators will want to adapt a deployment
strategy to fit their unique operational landscape.
Table 1-2, Network Worksheet