10 glossary – H3C Technologies H3C Intelligent Management Center User Manual
Page 138

129
10 Glossary
Ack status
Acknowledged status of an alarm. This can be Acknowledged or Unacknowledged.
ACS
Auto-Configuration Server. The server that interacts with the CPE and uses the CWMP to
manage the CPE. In BIMS, there is an ACS in each BIMS background. You can deploy
multiple ACSs in a distributed way, each of which manages a certain number of CPEs, thus
expanding the management capacity. ACS servers interact and synchronize data through the
JGroup protocol.
ACS URL
URL of the ACS used for managing CPEs, in the format of http://host:port, where host is the
host name or IP address of the ACS server, and the port is 9090 by default.
ACS username
and password
The username and passwor1 d that the CPE uses to access the ACS. Upon receiving the
connection request from the CPE, the ACS can use the ACS username and password of the
CPE to authenticate the CPE in the following order:
•
If the username and password of the CPE match those configured for a user in the authentication
user list, the CPE passes the authentication.
•
If BIMS uses the common password, the CPE passes the authentication if the ACS password is the
same as the common password.
•
Otherwise, the authentication fails.
Alarm level
Identifies the severity of an alarm, including Critical, Major, Minor, Warning, and Event in the
descending severity order. The status of a CPE depends on the highest level of alarm it raises.
Common version See
CPE
Customer Premises Equipment. A device supporting TR-069. CPEs are usually at the access
layer (edge) of a network, including ADSL devices, broadband routers, TV top-sets, WLAN
APs, IP phones, and so on. Upon receiving the TR-069 request from the background of BIMS,
the CPE performs the corresponding operation and returns the response.
CWMP
CPE WAN Management Protocol. A technical specification developed by Digital Subscribers
Line (DSL). Also known as TR-069. It provides the general architecture, message specification,
management method, and data model for the management and configuration of the home
network CPEs in the next-generation network. CWMP is usually used in DSL access networks.
DHCP
Dynamic Host Configuration Protocol. A network protocol used to configure network devices
so that they can communicate on an IP network. DHCP automates network-parameter
assignment to network devices from one or more DHCP servers. DHCP provides an extensible
framework through which a host can acquire various configuration parameters from a
centrally managed server, including (among others) the host's IP address, subnet mask,
default router, DNS domain, DNS server, and NTP servers.
DHCP spoofed
An attack on a DHCP server to obtain IP addresses using spoofed (falsified) DHCP messages.
BIMS can be configured to protect against DHCP spoofed messages using key or
token-based authentication protocols to prevent unauthorized senders from accessing the
network.
DNS
Domain Name System. A hierarchical distributed naming system for computers, services, or
any resource connected to the Internet or a private network.