throbber
Network Working Group M. St. Johns, Ed.
`Request for Comments: 2669 @Home Network
`Category: Proposed Standard August 1999
`
` DOCSIS Cable Device MIB
` Cable Device Management Information Base
` for DOCSIS compliant Cable Modems and
` Cable Modem Termination Systems
`
`Status of this Memo
`
` This document specifies an Internet standards track protocol for the
` Internet community, and requests discussion and suggestions for
` improvements. Please refer to the current edition of the "Internet
` Official Protocol Standards" (STD 1) for the standardization state
` and status of this protocol. Distribution of this memo is unlimited.
`
`Copyright Notice
`
` Copyright (C) The Internet Society (1999). All Rights Reserved.
`
`Abstract
`
` This memo defines a portion of the Management Information Base (MIB)
` for use with network management protocols in the Internet community.
` In particular, it defines a basic set of managed objects for SNMP-
` based management of DOCSIS 1.0 compliant Cable Modems and Cable Modem
` Termination Systems.
`
` This memo specifies a MIB module in a manner that is compliant to the
` SNMP SMIv2 [5][6][7]. The set of objects is consistent with the SNMP
` framework and existing SNMP standards.
`
` This memo is a product of the IPCDN working group within the Internet
` Engineering Task Force. Comments are solicited and should be
` addressed to the working group’s mailing list at ipcdn@terayon.com
` and/or the author.
`
`Table of Contents
`
`1 The SNMP Management Framework ................................... 2
`2 Glossary ........................................................ 3
`2.1 CATV .......................................................... 3
`2.2 CM ............................................................ 3
`2.3 CMTS .......................................................... 4
`2.4 DOCSIS ........................................................ 4
`
`St. Johns Standards [Page 1]
`
`RPX EXHIBIT 1014
`RPX v. CHANBOND
`
`

`
`RFC 2669 DOCSIS Cable Device MIB August 1999
`
`2.5 Downstream .................................................... 4
`2.6 Head-end ...................................................... 4
`2.7 MAC Packet .................................................... 4
`2.8 MCNS .......................................................... 4
`2.9 RF ............................................................ 4
`2.10 Upstream ..................................................... 4
`3 Overview ........................................................ 4
`3.1 Structure of the MIB .......................................... 5
`3.2 Management requirements ....................................... 6
`3.2.1 Handling of Software upgrades ............................... 6
`3.2.2 Events and Traps ............................................ 6
`3.2.3 Trap Throttling ............................................. 8
`3.2.3.1 Trap rate throttling ...................................... 8
`3.2.3.2 Limiting the trap rate .................................... 8
`3.3 Protocol Filters .............................................. 9
`3.3.1 Inbound LLC Filters - docsDevFilterLLCTable ................ 10
`3.3.2 Special Filters ............................................ 10
`3.3.2.1 IP Spoofing Filters - docsDevCpeTable .................... 10
`3.3.2.2 SNMP Access Filters - docsDevNmAccessTable ............... 10
`3.3.3 IP Filtering - docsDevIpFilterTable ........................ 11
`3.3.4 Outbound LLC Filters ....................................... 13
`4 Definitions .................................................... 13
`5 Acknowledgments ................................................ 51
`6 References ..................................................... 51
`7 Security Considerations ........................................ 52
`8 Intellectual Property .......................................... 54
`9 Author’s Address ............................................... 54
`10 Full Copyright Statement ...................................... 55
`
`1. The SNMP Management Framework
`
` The SNMP Management Framework presently consists of five major
` components:
`
` o An overall architecture, described in RFC 2571 [1].
`
` o Mechanisms for describing and naming objects and events for the
` purpose of management. The first version of this Structure of
` Management Information (SMI) is called SMIv1 and described in STD
` 16, RFC 1155 [2], STD 16, RFC 1212 [3] and RFC 1215 [4]. The
` second version, called SMIv2, is described in STD 58, RFC 2578
` [5], STD 58, RFC 2579 [6] and STD 58, RFC 2580 [7].
`
` o Message protocols for transferring management information. The
` first version of the SNMP message protocol is called SNMPv1 and
` described in STD 15, RFC 1157 [8]. A second version of the SNMP
` message protocol, which is not an Internet standards track
` protocol, is called SNMPv2c and described in RFC 1901 [9] and RFC
`
`St. Johns Standards [Page 2]
`
`

`
`RFC 2669 DOCSIS Cable Device MIB August 1999
`
` 1906 [10]. The third version of the message protocol is called
` SNMPv3 and described in RFC 1906 [10], RFC 2572 [11] and RFC 2574
` [12].
`
` o Protocol operations for accessing management information. The
` first set of protocol operations and associated PDU formats is
` described in STD 15, RFC 1157 [8]. A second set of protocol
` operations and associated PDU formats is described in RFC 1905
` [13].
`
` o A set of fundamental applications described in RFC 2573 [14] and
` the view-based access control mechanism described in RFC 2575
` [15].
`
` Managed objects are accessed via a virtual information store, termed
` the Management Information Base or MIB. Objects in the MIB are
` defined using the mechanisms defined in the SMI.
`
` This memo specifies a MIB module that is compliant to the SMIv2. A
` MIB conforming to the SMIv1 can be produced through the appropriate
` translations. The resulting translated MIB must be semantically
` equivalent, except where objects or events are omitted because no
` translation is possible (use of Counter64). Some machine readable
` information in SMIv2 will be converted into textual descriptions in
` SMIv1 during the translation process. However, this loss of machine
` readable information is not considered to change the semantics of the
` MIB.
`
`2. Glossary
`
` The terms in this document are derived either from normal cable
` system usage, or from the documents associated with the Data Over
` Cable Service Interface Specification process.
`
`2.1. CATV
`
` Originally "Community Antenna Television", now used to refer to any
` cable or hybrid fiber and cable system used to deliver video signals
` to a community.
`
`2.2. CM Cable Modem.
`
` A CM acts as a "slave" station in a DOCSIS compliant cable data
` system.
`
`St. Johns Standards [Page 3]
`
`

`
`RFC 2669 DOCSIS Cable Device MIB August 1999
`
`2.3. CMTS Cable Modem Termination System.
`
` A generic term covering a cable bridge or cable router in a head-end.
` A CMTS acts as the master station in a DOCSIS compliant cable data
` system. It is the only station that transmits downstream, and it
` controls the scheduling of upstream transmissions by its associated
` CMs.
`
`2.4. DOCSIS
`
` "Data Over Cable Interface Specification". A term referring to the
` ITU-T J.112 Annex B standard for cable modem systems [20].
`
`2.5. Downstream
`
` The direction from the head-end towards the subscriber.
`
`2.6. Head-end
`
` The origination point in most cable systems of the subscriber video
` signals. Generally also the location of the CMTS equipment.
`
`2.7. MAC Packet
`
` A DOCSIS PDU.
`
`2.8. MCNS
`
` "Multimedia Cable Network System". Generally replaced in usage by
` DOCSIS.
`
`2.9. RF
`
` Radio Frequency.
`
`2.10. Upstream
`
` The direction from the subscriber towards the head-end.
`
`3. Overview
`
` This MIB provides a set of objects required for the management of
` DOCSIS compliant Cable Modems (CM) and Cable Modem Termination
` Systems (CMTS). The specification is derived from the DOCSIS Radio
` Frequency Interface specification [16]. Please note that the DOCSIS
` 1.0 standard only requires Cable Modems to implement SNMPv1 and to
`
`St. Johns Standards [Page 4]
`
`

`
`RFC 2669 DOCSIS Cable Device MIB August 1999
`
` process IPv4 customer traffic. Design choices in this MIB reflect
` those requirements. Future versions of the DOCSIS standard are
` expected to require support for SNMPv3 and IPv6 as well.
`
` The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
` "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
` document are to be interpreted as described in [19].
`
`3.1. Structure of the MIB
`
` This MIB is structured into seven groups:
`
` o The docsDevBase group extends the MIB-II ’system’ group with
` objects needed for cable device system management.
`
` o The docsDevNmAccessGroup provides a minimum level of SNMP
` access security (see Section 3 of [18]).
`
` o The docsDevSoftware group provides information for network-
` downloadable software upgrades. See "Handling of Software
` Upgrades" below..
`
` o The docsDevServer group provides information about the
` progress of the interaction between the CM or CMTS and
` various provisioning servers.
`
` o The docsDevEvent group provides control and logging for event
` reporting.
`
` o The docsDevFilter group configures filters at link layer and
` IP layer for bridged data traffic. This group consists of a
` link-layer filter table, docsDevFilterLLCTable, which is used
` to manage the processing and forwarding of non-IP traffic; an
` IP packet classifier table, docsDevFilterIpTable, which is
` used to map classes of packets to specific policy actions; a
` policy table, docsDevFilterPolicyTable, which maps zero or
` more policy actions onto a specific packet classification,
` and one or more policy action tables.
`
` At this time, this MIB specifies only one policy action
` table, docsDevFilterTosTable, which allows the manipulation
` of the type of services bits in an IP packet based on
` matching some criteria. The working group may add additional
` policy types and action tables in the future, for example to
` allow QOS to modem service identifier assignment based on
` destination.
`
`St. Johns Standards [Page 5]
`
`

`
`RFC 2669 DOCSIS Cable Device MIB August 1999
`
` o The docsDevCpe group provides control over which IP addresses
` may be used by customer premises equipment (e.g. PCs)
` serviced by a given cable modem. This provides anti-spoofing
` control at the point of origin for a large cable modem
` system. This group is separate from docsDevFilter primarily
` as this group is only implemented on the Cable Modem (CM) and
` MUST NOT be implemented on the Cable Modem Termination System
` (CMTS).
`
`3.2. Management requirements
`
`3.2.1. Handling of Software upgrades
`
` The Cable Modem software upgrade process is documented in [16]. From
` a network management station, the operator:
`
` o sets docsDevSwServer to the address of the TFTP server for
` software upgrades
`
` o sets docsDevSwFilename to the file pathname of the software
` upgrade image
`
` o sets docsDevSwAdminStatus to upgrade-from-mgt
`
` One reason for the SNMP-initiated upgrade is to allow loading of a
` temporary software image (e.g., special diagnostic software) that
` differs from the software normally used on that device without
` changing the provisioning database.
`
` Note that software upgrades should not be accepted blindly by the
` cable device. The cable device may refuse an upgrade if:
`
` o The download is incomplete.
`
` o The file contents are incomplete or damaged.
`
` o The software is not intended for that hardware device (may
` include the case of a feature set that has not been purchased
` for this device).
`
`3.2.2. Events and Traps
`
` This MIB provides control facilities for reporting events through
` syslog, traps, and non-volatile logging. If events are reported
` through traps, the specified conventions must be followed. Other
` means of event reporting are outside the scope of this document.
`
`St. Johns Standards [Page 6]
`
`

`
`RFC 2669 DOCSIS Cable Device MIB August 1999
`
` The definition and coding of events is vendor-specific. In deference
` to the network operator who must troubleshoot multi-vendor networks,
` the circumstances and meaning of each event should be reported as
` human-readable text. Vendors SHOULD provide time-of-day clocks in
` CMs to provide useful timestamping of events.
`
` For each vendor-specific event that is reportable via TRAP, the
` vendor must create an enterprise-specific trap definition. Trap
` definitions MUST include the event reason encoded as DisplayString
` and should be defined as:
`
` trapName NOTIFICATION-TYPE
` OBJECTS {
` ifIndex,
` eventReason,
` other useful objects
` }
` STATUS current
` DESCRIPTION
` "trap description"
` ::= Object Id
`
` Note that ifIndex is only included if the event or trap is interface
` related.
`
` An example (fake) vendor defined trap might be:
`
` xyzVendorModemDropout NOTIFICATION-TYPE
` OBJECTS {
` eventReason,
` xyzModemHighWatermarkCount
` }
` STATUS current
` DESCRIPTION
` "Sent by a CMTS when a configurable number of modems
` (xyzModemHysteresis) de-register or become unreachable during
` the sampling period (5 minutes). Used to warn a management
` station about a catastrophic cable plant outage."
` ::= { xyzTraps 23 }
`
` In this example eventReason is a DisplayString providing a human
` readable error message, and xyzModemHighWatermarkCount is a Gauge32
` which indicates the maximum number of modems during the epoch.
`
`St. Johns Standards [Page 7]
`
`

`
`RFC 2669 DOCSIS Cable Device MIB August 1999
`
` The last digit of the trap OID for enterprise-specific traps must
` match docsDevEvId. For SNMPv1-capable Network Management systems,
` this is necessary to correlate the event type to the trap type. Many
` Network Management systems are only capable of trap filtering on an
` enterprise and single-last-digit basis.
`
`3.2.3. Trap Throttling
`
` The CM and CMTS MUST provide support for trap message throttling as
` described below. The network operator can employ message rate
` throttling or trap limiting by manipulating the appropriate MIB
` variables.
`
`3.2.3.1. Trap rate throttling
`
` Network operators may employ either of two rate control methods. In
` the first method, the device ceases to send traps when the rate
` exceeds the specified maximum message rate. It resumes sending traps
` only if reactivated by a network management station request.
`
` In the second method, the device resumes sending traps when the rate
` falls below the specified maximum message rate.
`
` The network operator configures the specified maximum message rate by
` setting the measurement interval (in seconds), and the maximum number
` of traps to be transmitted within the measurement interval. The
` operator can query the operational throttling state (to determine
` whether traps are enabled or blocked by throttling) of the device, as
` well as query and set the administrative throttling state (to manage
` the rate control method) of the device.
`
`3.2.3.2. Limiting the trap rate
`
` Network operators may wish to limit the number of traps sent by a
` device over a specified time period. The device ceases to send traps
` when the number of traps exceeds the specified threshold. It resumes
` sending traps only when the measurement interval has passed.
`
` The network operator defines the maximum number of traps he is
` willing to handle and sets the measurement interval to a large number
` (in hundredths of a second). For this case, the administrative
` throttling state is set to stop at threshold which is the maximum
` number of traps.
`
` See "Techniques for Managing Asynchronously Generated Alerts" [17]
` for further information.
`
`St. Johns Standards [Page 8]
`
`

`
`RFC 2669 DOCSIS Cable Device MIB August 1999
`
`3.3. Protocol Filters
`
` The Cable Device MIB provides objects for both LLC and IP protocol
` filters. The LLC protocol filter entries can be used to limit CM
` forwarding to a restricted set of network-layer protocols (such as
` IP, IPX, NetBIOS, and Appletalk).
`
` The IP protocol filter entries can be used to restrict upstream or
` downstream traffic based on source and destination IP addresses,
` transport-layer protocols (such as TCP, UDP, and ICMP), and source
` and destination TCP/UDP port numbers.
`
` In general, a cable modem applies filters (or more properly,
` classifiers) in an order appropriate to the layering model.
` Specifically, the inbound MAC (or LLC) layer filters are applied
` first, then the "special" filters, then the IP layer inbound filters,
` then the IP layer outbound filters, then any final LLC outbound
` filters. Since the cable modem does not generally do any IP
` processing (other than that specified by the filters) the processing
` of the IP in filters and IP out filters can usually be combined into
` a single step.
`
` ***************
` * LLC Filters *
` ***************
` | | |
` v | v
` ************ | ***************
` * IP Spoof * | * SNMP Access *
` ************ | ***************
` | | |
` v v v
` ****************
` * IP Filter In *
` ****************
` |
` v
` *****************
` * IP Filter Out *
` *****************
` |
` v
` ***********
` * LLC Out *
` ***********
`
`St. Johns Standards [Page 9]
`
`

`
`RFC 2669 DOCSIS Cable Device MIB August 1999
`
`3.3.1. Inbound LLC Filters - docsDevFilterLLCTable
`
` The inbound LLC (or MAC or level-2) filters are contained in the
` docsDevFilterLLCTable and are applied to level-2 frames entering the
` cable modem from either the RF MAC interface or from one of the CPE
` (ethernet or other) interfaces. These filters are used to prohibit
` the processing and forwarding of certain types of level-2 traffic
` that may be disruptive to the network. The filters, as currently
` specified, can be set to cause the modem to either drop frames which
` match at least one filter, or to process a frame which matches at
` least filter. Some examples of possible configurations would be to
` only permit IP (and ARP) traffic, or to drop NETBUEI traffic.
`
`3.3.2. Special Filters
`
` Special filters are applied after the packet is accepted from the MAC
` layer by the IP module, but before any other processing is done.
` They are filters that apply only to a very specific class of traffic.
`
`3.3.2.1. IP Spoofing Filters - docsDevCpeTable
`
` IP spoofing filters are applied to packets entering the modem from
` one of the CPE interfaces and are intended to prevent a subscriber
` from stealing or mis-using IP addresses that were not assigned to the
` subscriber. If the filters are active (enabled), the source address
` of the IP packet must match at least one IP address in this table or
` it is discarded without further processing.
`
` The table can be automatically populated where the first N different
` IP addresses seen from the CPE side of the cable modem are used to
` automatically populate the table. The spoofing filters are specified
` in the docsDevCpeTable and the policy for automatically creating
` filters in that table is controlled by docsDevCpeEnroll and
` docsDevCpeMax as well as the network management agent.
`
`3.3.2.2. SNMP Access Filters - docsDevNmAccessTable
`
` The SNMP access filters are applied to SNMP packets entering from any
` interface and destined for the cable modem. If the packets enter
` from a CPE interface, the SNMP filters are applied after the IP
` spoofing filters. The filters only apply to SNMPv1 or SNMPv2c
` traffic, and are not consulted for SNMPv3 traffic (and need not be
` implemented by a v3 only agent). SNMPv3 access control is specified
` in the User Security Model MIB in [12].
`
`St. Johns Standards [Page 10]
`
`

`
`RFC 2669 DOCSIS Cable Device MIB August 1999
`
`3.3.3. IP Filtering - docsDevIpFilterTable
`
` The IP Filtering table acts as a classifier table. Each row in the
` table describes a template against which IP packets are compared.
` The template includes source and destination addresses (and their
` associated masks), upper level protocol (e.g. TCP, UDP), source and
` destination port ranges, TOS and TOS mask. A row also contains
` interface and traffic direction match values which have to be
` considered in combination. All columns of a particular row must
` match the appropriate fields in the packet, and must match the
` interface and direction items for the packet to result in a match to
` the packet.
`
` When classifying a packet, the table is scanned beginning with the
` lowest number filter. If the agent finds a match, it applies the
` group of policies specified. If the matched filter has the continue
` bit set, the agent continues the scan possibly matching additional
` filters and applying additional policies. This allows the agent to
` take one set of actions for the 24.0.16/255.255.255.0 group and one
` set of actions for telnet packets to/from 24.0.16.30 and these sets
` of actions may not be mutually exclusive.
`
` Once a packet is matched, one of three actions happen based on the
` setting of docsDevFilterIpControl in the row. The packet may be
` dropped, in which case no further processing is required. The packet
` may be accepted and processing of the packet continues. Lastly, the
` packet may have a set of policy actions applied to it. If
` docsDevFilterIpContinue is set to true, scanning of the table
` continues and additional matches may result.
`
` When a packet matches, and docsDevFilterIpControl in the filter
` matched is set to ’policy’, the value of docsDevFilterIpPolicyId is
` used as a selector into the docsDevFilterPolicyTable. The first
` level of indirection may result in zero or more actions being taken
` based on the match. The docsDevFilterPolicyTable is scanned in row
` order and all rows where docsDevFilterPolicyId equals
` docsDevFilterIpPolicyId have the action specified by
` docsDevFilterPolicyValue ’executed’. For example, a value pointing
` to an entry in the docsDevFilterTosTable may result in the re-writing
` of the TOS bits in the IP packet which was matched. Another
` possibility may be to assign an output packet to a specific output
` upstream queue. An even more complex action might be to re-write the
` TOS value, assign the packet to an upstream service ID, and drop it
` into a particular IPSEC tunnel.
`
`St. Johns Standards [Page 11]
`
`

`
`RFC 2669 DOCSIS Cable Device MIB August 1999
`
` Example:
`
` docsDevFilterIpTable
`
` # Index, SrcIP/Mask, DstIP/Mask,ULP, SrcPts,DstPts,Tos/Mask,
` # Int/Dir, Pgroup, [continue]
` # drop any netbios traffic
` 10, 0/0, 0/0, TCP, any, 137-139, 0/0, any/any, drop
`
` # traffic to the proxy gets better service - other matches possible
` 20, 0/0, proxy/32, TCP, any,any, 0/0, cpe/in, 10, continue
`
` # Traffic from CPE 1 gets ’Gold’ service, other matches possible
` 30, cpe1/32, 0/0, any, any,any, 0/0, cpe/in, 20, continue
`
` # Traffic from CPE2 to work goes, other traffic dropped
` 40, cpe2/32, workIPs/24, any, 0/0, cpe/in, accept
` 45, cpe2/32, 0/0, any, any,ayn, 0/0, cpe/in, drop
`
` # Traffic with TOS=4 gets queued on the "silver" queue.
` 50, 0/0, 0/0, any, any,any, 4/255, cpe/in, 30
`
` # Inbound "server" traffic to low numbered ports gets dropped.
` 60, 0/0, 0/0, TCP, any,1-1023, 0/0, cpe/out, drop
` 65, 0/0, 0/0, UDP, any,1-1023, 0/0, cpe/out, drop
`
` docsDevFilterIpPolicyTable
`
` #
` # index, policy group, policy
` 10, 10, queueEntry.20 -- special queue for traffic to proxy
`
` 15, 20, queueEntry.15 -- Gold Service queue
` 20, 20, docsDevFilterTosStatus.10 -- Mark this packet with TOS 5
`
` 25, 30, queueEntry.10 -- Silver service queue
`
` This table describes some special processing for packets originating
` from either the first or second CPE device which results in their
` queuing on to special upstream traffic queues and for the "gold"
` service results in having the packets marked with a TOS of 5. The
` 10, 20, 60 and 65 entries are generic entries that would generally be
` applied to all traffic to this CM. The 30, 40 and 45 entries are
` specific to a particular CPE’s service assignments. The ordering
` here is a bit contrived, but is close to what may actually be
` required by the operator to control various classes of customers.
`
`St. Johns Standards [Page 12]
`
`

`
`RFC 2669 DOCSIS Cable Device MIB August 1999
`
`3.3.4. Outbound LLC Filters
`
` Lastly, any outbound LLC filters are applied to the packet just prior
` to it being emitted on the appropriate interface. This MIB does not
` specify any outbound LLC filters, but it is anticipated that the QOS
` additions to the DOCSIS standard may include some outbound LLC
` filtering requirements. If so, those filters would be applied as
` described here.
`
`4. Definitions
`
`DOCS-CABLE-DEVICE-MIB DEFINITIONS ::= BEGIN
`
`IMPORTS
` MODULE-IDENTITY,
` OBJECT-TYPE,
`-- do not import BITS,
` IpAddress,
` Unsigned32,
` Counter32,
` Integer32,
` zeroDotZero,
` mib-2
` FROM SNMPv2-SMI
` RowStatus,
` RowPointer,
` DateAndTime,
` TruthValue
` FROM SNMPv2-TC
` OBJECT-GROUP,
` MODULE-COMPLIANCE
` FROM SNMPv2-CONF
` SnmpAdminString
` FROM SNMP-FRAMEWORK-MIB
` InterfaceIndexOrZero
` FROM IF-MIB; -- RFC2233
`
`docsDev MODULE-IDENTITY
` LAST-UPDATED "9908190000Z" -- August 19, 1999
` ORGANIZATION "IETF IPCDN Working Group"
` CONTACT-INFO
` " Michael StJohns
` Postal: @Home Network
` 425 Broadway
` Redwood City, CA 94063
` U.S.A.
` Phone: +1 650 569 5368
` E-mail: stjohns@corp.home.net"
`
`St. Johns Standards [Page 13]
`
`

`
`RFC 2669 DOCSIS Cable Device MIB August 1999
`
` DESCRIPTION
` "This is the MIB Module for MCNS-compliant cable modems and
` cable-modem termination systems."
` REVISION "9908190000Z"
` DESCRIPTION
` "Initial Version, published as RFC 2669.
` Modified by Mike StJohns to add/revise filtering, TOS
` support, software version information objects."
` ::= { mib-2 69 }
`
`docsDevMIBObjects OBJECT IDENTIFIER ::= { docsDev 1 }
`docsDevBase OBJECT IDENTIFIER ::= { docsDevMIBObjects 1 }
`
`--
`-- For the following object, there is no concept in the
`-- RFI specification corresponding to a backup CMTS. The
`-- enumeration is provided here in case someone is able
`-- to define such a role or device.
`--
`
`docsDevRole OBJECT-TYPE
` SYNTAX INTEGER {
` cm(1),
` cmtsActive(2),
` cmtsBackup(3)
` }
` MAX-ACCESS read-only
` STATUS current
` DESCRIPTION
` "Defines the current role of this device. cm (1) is
` a Cable Modem, cmtsActive(2) is a Cable Modem Termination
` System which is controlling the system of cable modems,
` and cmtsBackup(3) is a CMTS which is currently connected,
` but not controlling the system (not currently used).
`
` In general, if this device is a ’cm’, its role will not
` change during operation or between reboots. If the
` device is a ’cmts’ it may change between cmtsActive and
` cmtsBackup and back again during normal operation. NB:
` At this time, the DOCSIS standards do not support the
` concept of a backup CMTS, cmtsBackup is included for
` completeness."
` ::= { docsDevBase 1 }
`
`docsDevDateTime OBJECT-TYPE
` SYNTAX DateAndTime
` MAX-ACCESS read-write
` STATUS current
`
`St. Johns Standards [Page 14]
`
`

`
`RFC 2669 DOCSIS Cable Device MIB August 1999
`
` DESCRIPTION
` "The date and time, with optional timezone
` information."
` ::= { docsDevBase 2 }
`
`docsDevResetNow OBJECT-TYPE
` SYNTAX TruthValue
` MAX-ACCESS read-write
` STATUS current
` DESCRIPTION
` "Setting this object to true(1) causes the device to reset.
` Reading this object always returns false(2)."
` ::= { docsDevBase 3 }
`
`docsDevSerialNumber OBJECT-TYPE
` SYNTAX SnmpAdminString
` MAX-ACCESS read-only
` STATUS current
` DESCRIPTION
` "The manufacturer’s serial number for this device."
` ::= { docsDevBase 4 }
`
`docsDevSTPControl OBJECT-TYPE
` SYNTAX INTEGER {
` stEnabled(1),
` noStFilterBpdu(2),
` noStPassBpdu(3)
` }
` MAX-ACCESS read-write
` STATUS current
` DESCRIPTION
` "This object controls operation of the spanning tree
` protocol (as distinguished from transparent bridging).
` If set to stEnabled(1) then the spanning tree protocol
` is enabled, subject to bridging constraints. If
` noStFilterBpdu(2), then spanning tree is not active,
` and Bridge PDUs received are discarded.
` If noStPassBpdu(3) then spanning tree is not active
` and Bridge PDUs are transparently forwarded. Note that
` a device need not implement all of these options,
` but that noStFilterBpdu(2) is required."
` ::= { docsDevBase 5 }
`
`--
`-- The following table provides one level of security for access
`-- to the device by network management stations.
`-- Note that access is also constrained by the
`-- community strings and any vendor-specific security.
`
`St. Johns Standards [Page 15]
`
`

`
`RFC 2669 DOCSIS Cable Device MIB August 1999
`
`--
`
`docsDevNmAccessTable OBJECT-TYPE
` SYNTAX SEQUENCE OF DocsDevNmAccessEntry
` MAX-ACCESS not-accessible
` STATUS current
` DESCRIPTION
` "This table controls access to SNMP objects by network
` management stations. If the table is empty, access
` to SNMP objects is unrestricted. This table exists only
` on SNMPv1 or v2c agents and does not exist on SNMPv3
` agents. See the conformance section for details.
` Specifically, for v3 agents, the appropriate MIBs and
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket