Configuring the Cisco RFGW-10 for the First Time

This section describes how to start up and configure the Cisco RFGW-10 for the first time. The chapter contains the following sections:

 

Section
Purpose

Preparing for Configuration

Identifies tasks and analysis that you must complete prior to powering on and configuring the Cisco RFGW-10.

Understanding Cisco RFGW-10 Configuration Fundamentals

Describes the basic principles of using passwords and summarizes the initial router configuration utilities that are available to you.

Administratively Shutting Down and Restarting an Interface

Provides instructions for interface shutdown and restart.

Configuring the Cisco RFGW-10 Manually Using Configuration Mode

Describes how to configure the Cisco RFGW-10 manually.

Saving Your Configuration Settings

Describes how to save your configurations on the Cisco RFGW-10.

Reviewing your Configuration Settings

Provides commands to check your settings and review any changes to your configuration.

 

Preparing for Configuration

Complete these prerequisite steps before you power on and configure the Cisco RFGW-10:

  • Ensure that the network supports reliable broadband data transmission. Your facility must be cleaned, balanced, and certified based on National Television Standards Committee (NTSC) or appropriate international cable plant recommendations. Ensure your facility meets all DOCSIS requirements.
  • Ensure that the Cisco RFGW-10 is installed according to the instructions in the hardware installation guide.
  • Ensure that all other required headend or distribution hub routing and network interface equipment is installed, configured, and operational (based on the supported services). This includes:

– All routers

– Servers (Dynamic Host Configuration Protocol (DHCP) servers, Trivial File Transfer Protocol (TFTP) servers, and time-of-day (ToD) servers)

– Network management systems

– Other configuration or billing systems

  • Ensure that DHCP and DOCSIS configuration files are created and transferred to the appropriate servers so that each cable modem, when initialized, can:

– Transmit a DHCP request

– Receive an IP address

– Obtain TFTP and ToD server addresses

– Download a DOCSIS configuration file in your network

  • Ensure that customer premises equipment (CPE)—CMs or set-top boxes (STBs), PCs, telephones, or facsimile machines—meet requirements for your network and service offerings.
  • Be familiar with your channel plan to assign appropriate frequencies. Outline your strategies for setting up bundling, if applicable to your headend or distribution hub. As appropriate, obtain the following:

– Passwords

– IP addresses

– Subnet masks

– Device names

After these prerequisites are met, you are ready to configure the Cisco RFGW-10. This includes, at a minimum:

  • Configuring a host name and password for the Cisco RFGW-10
  • Configuring the CMTS to support IP over the cable plant and network backbone

Caution If you plan to use service-class-based provisioning, the service classes must be configured at the CMTS before CMs attempt to make a connection.


Note Effective from Cisco IOS-XE 3.2.0SQ, IPv6 is not supported on interface FA1 of the Cisco RFGW-10.


Setting Platform Variables from IOS Environment

Effective with Cisco IOS-XE 3.2.3SQ, platform environment variables such as BootParam1 can be modified from the IOS Command Line Interface. This provides a convenient way to modify these variables, instead of using a directly connected console to modify them via the ROMMON.

The following example shows how to use the unset the Bootparam platform variable:

rommon1> unset Bootparam1


Note This feature is not supported in Cisco IOS-XE 3.3.0SQ and later releases.


Understanding Cisco RFGW-10 Configuration Fundamentals

This section describes the basic parameters of using passwords.


Note These sections provide minimal configuration instructions. For additional configuration information, refer to subsequent chapters in this guide.



Tip Be sure to have the appropriate addresses and values based on your network before you attempt to configure the router. Enter the show version command to display the release of Cisco IOS software on your router.


Using the Enable Secret and the Enable Passwords

The Cisco RFGW-10 is administered using the Cisco command interpreter, called the EXEC. You must boot and log in to the router before you can enter an EXEC command.


Step 1 Connect a terminal to the I/O controller console port of the Cisco RFGW-10 and establish a terminal session. You can open a Terminal application (Hyper Terminal) on a PC as follows:

a. Connect using: Direct to Com 1

b. Set bits per second: 9600

c. Set data bits: 8

d. Set parity: none

e. Set stop bit: 1

f. Set flow control: none

Setting Password Protection


Note For security purposes, the EXEC has two levels of access to commands: user EXEC mode and privileged EXEC mode. The commands available at the user level are a subset of those available at the privileged level.



Tip Because many privileged-level EXEC commands are used to set operating parameters, password-protect these commands to prevent unauthorized use.


At the EXEC prompt, enter one of the following two commands to set password protection:

  • enable secret password (which is a very secure, encrypted password)
  • enable password (which is a less secure, nonencrypted password)

To gain access to privileged-level commands, enter the desired password.


Note An enable secret password can contain from 1 to 25 uppercase and lowercase alphanumeric characters. An enable password can contain any number of uppercase and lowercase alphanumeric characters. A number cannot be the first character. Spaces are valid password characters; for example, “two words” is a valid password. Leading spaces are ignored. Trailing spaces are recognized. Alphanumeric characters are recognized as uppercase or lowercase.


Passwords should be different for maximum security. If you enter the same password for both during the setup script, the system accepts it, but you receive a warning message indicating that you should enter a different password.

Replacing or Recovering a Lost Password

This section describes how to recover a lost enable or console login password and how to replace a lost enable secret password on your Cisco RFGW-10.


Note It is possible to recover the enable or console login password. However, the enable secret password is encrypted, and must be replaced with a new enable secret password.


Overview of the Password Recovery Process

Following is an overview of the general steps in the password recovery procedure:


Step 1 If you can log in to the router, enter the show version command to determine the existing configuration register value.

Step 2 Press the Break key to get to the bootstrap program prompt (ROM monitor). You might need to reload the system image by power cycling the router.

Step 3 Change the configuration register so that the following functions are enabled:

  • Break
  • Ignore startup configuration
  • Boot from Flash memory

Note The key to recovering a lost password is to set the configuration register bit 6 (0x0040) so that the startup configuration (usually in NVRAM) is ignored. This allows you to log in without using a password and to display the startup configuration passwords. Cisco recommends setting the configuration register to 0x142.


Step 4 Power cycle the router by turning power off and then back on.

Step 5 Log in to the router and enter the privileged EXEC mode.

Step 6 Enter the show startup-config command to display the passwords.

Step 7 Recover or replace the displayed passwords.

Step 8 Change the configuration register back to its original setting.


 


Note To recover a lost password if Break is disabled on the router, you must have physical access to the router.


Replacing or Recovering Passwords

Complete the following steps to recover or replace a lost enable, enable secret, or console login password:


Step 1 Attach an ASCII terminal to the console port on your Cisco RFGW-10.

Step 2 Configure the terminal to operate at 9600 baud, 8 data bits, no parity, and 2 stop bits.

Step 3 If you can log in to the router as a nonprivileged user, enter the show version command to display the existing configuration register value. Note the value for later use. If you cannot log in to the router at all, continue with the next step.

Step 4 Press the Break key or send a Break from the console terminal.

Step 5 Within 60 seconds of restoring the power to the router, press the Break key or send a Break. This action causes the router to enter the ROM monitor and display the ROM monitor prompt ( rommon 1> ).

Step 6 To set the configuration register on a Cisco RFGW-10, use the configuration register utility by entering the confreg command at the ROM monitor prompt as follows:

rommon 1> confreg
 

Answer yes to the enable ignore system config info? prompt and note the current configuration register settings.

Step 7 Initialize the router by entering the reset command as follows:

rommon 2> reset
 

The router initializes, the configuration register is set to 0x142, the router boots the system image from Flash memory and enters the System Configuration dialog (setup), as follows:

--- System Configuration Dialog --

Step 8 Enter no in response to the System Configuration dialog prompts until the following message appears:

Press RETURN to get started!
 

Step 9 Press Return. The user EXEC prompt appears as follows:

Router>
 

Step 10 Enter the enable command to enter privileged EXEC mode.

Step 11 Enter the show startup-config command to display the passwords in the configuration file as follows:

Router# show startup-config
 

Step 12 Scan the configuration file display looking for the passwords; the enable passwords are usually near the beginning of the file, and the console login or user EXEC password is near the end. The passwords displayed will look something like this:

enable secret 5 $1$ORPP$s9syZt4uKn3SnpuLDrhuei
enable password 23skiddoo
.
.
line con 0
password onramp
 

Note The enable secret password is encrypted and cannot be recovered; it must be replaced. The enable and console passwords can be encrypted text or clear text.


Proceed to the next step to replace an enable secret, console login, or enable password. If there is no enable secret password, note the enable and console login passwords if they are not encrypted and proceed to Step 17.


Caution Do not perform the next step unless you have determined that you must change or replace the enable, enable secret, or console login passwords. Failure to follow the steps as presented here could cause your router configuration to be erased.

Step 13 Enter the configure memory command to load the startup configuration file into running memory. This action allows you to modify or replace passwords in the configuration.

Router# configure memory
 

Step 14 Enter the configure terminal command for configuration mode:

Router# configure terminal
 

Step 15 Enter the following commands to change the passwords:

Router(config)# enable secret newpassword1
Router(config)# enable password newpassword2
Router(config)# line con 0
Router(config)# password newpassword3
 

Change only the passwords necessary for your configuration. You can remove individual passwords by using the no form of the previous commands. For example, entering the no enable secret command removes the enable secret password.

Step 16 You must configure all interfaces to not be administratively shut down as follows:

Router(config)# interface GigabitEthernet 1/3
Router(config)# no shutdown
 

Enter the equivalent commands for all interfaces that were originally configured. If you omit this step, all interfaces are administratively shut down and unavailable when the router is restarted.

Step 17 Use the config-registe r command to set the configuration register to the original value noted in If you can log in to the router as a nonprivileged user, enter the show version command to display the existing configuration register value. Note the value for later use. If you cannot log in to the router at all, continue with the next step. or Initialize the router by entering the reset command as follows:.

Step 18 Press Ctrl-Z or type end to exit configuration mode:

Router(config)# end
 

Caution Do not perform the next step unless you have changed or replaced a password. If you skipped Step 13 through Step 16 previously, then proceed to Step 20. Failure to observe this sequence causes the system to erase your router configuration file.

Step 19 Enter the copy running-config startup-config command to save the new configuration to nonvolatile (NVRAM) memory:

Router# copy running-config startup-config
 

Step 20 Enter the reload command to reboot the router:

Router# reload
 

Step 21 Log in to the router with the new or recovered passwords.


 

Administratively Shutting Down and Restarting an Interface

You can disable an interface by shutting it down. Shutting down an interface disables all functions on the specified interface and marks the interface as unavailable on the display of all monitoring commands.One reason to shut down an interface is if you want to change the electrical interface type or mode of a port online. This information is communicated to other network servers through all dynamic routing protocols. You replace the serial adapter cable, for example, and use software commands to restart the interface, and if necessary, to reconfigure the port for the new interface. The interface is not featured in any routing updates. On serial interfaces, shutting down an interface causes the dedicated Token Ring (DTR) signal to be dropped. On Token Ring interfaces, shutting down an interface causes the interface to exit from the ring. On Fiber Distributed Data Interfaces (FDDIs), shutting down an interface causes the optical bypass switch, if present, to go into bypass mode.

To shut down an interface and then restart it, use the following commands in interface configuration mode:

 

Command
Purpose

shutdown

Shuts down an interface.

no shutdown

Enables an interface that has been disabled.

 

To check whether an interface is disabled, use the show interfaces command in Privileged EXEC mode. An interface that is shut down is shown as administratively down in the show interfaces command display.

At system startup or restart, the Fast Serial Interface Processor (FSIP) polls the interfaces and determines the electrical interface type of each port (according to the type of port adapter cable attached). However, it does not necessarily poll an interface again when you change the adapter cable online.

To ensure that the system recognizes the new interface type, shut down the interface using the shutdown command, and enable the interface after changing the cable. See your hardware documentation for more details.

Examples

The following example turns off the Ethernet interface in slot 1 at port 3:

interface GigabitEthernet 1/3
shutdown
 

The following example restarts the interface:

interface GigabitEthernet 1/3
no shutdown
 

For information on configuring the appropriate line cards, see:

  • Configuring the Cisco RFGW DS48 Universal EQAM Line Card
  • Configuring QAM Features for the Cisco RFGW-10 DS-384 Line Card

Configuring the Cisco RFGW-10 Manually Using Configuration Mode

This section describes how to configure the Cisco RFGW-10 the first time.

Entering the Initial Configuration Information

To set up the Cisco RFGW-10, assign an IP address and other configuration information necessary for the switch to communicate with the local routers and the Internet. The minimal configuration provided here does not cover feature configuration. For feature configurations, see the feature guides at http://www.cisco.com/en/US/products/ps8360/products_feature_guides_list.html.

Basic Configuration Using the Setup Facility

The first time you power on a Cisco RFGW-10, the setup facility starts. You can also initiate the facility by running the setup command in privileged EXEC mode. This facility helps you enhance a default configuration that already exists on the Cisco RFGW-10. The setup facility uses a question-and-answer sequence called the System Configuration Dialog to walk you through the configuration.

You do not have to configure the interfaces immediately; however, without configuring the interfaces you cannot enable or connect these interfaces to the networks.


Tip You can quickly connect to the network using the basic configuration setup. This allows you retrieve a configuration file from a TFTP server.


System Configuration Dialog

Use the System Configuration Dialog to help you perform a basic configuration. Proceed through the dialog by answering questions and then pressing the ENTER key. In most cases, you can get additional information by entering a question mark (?).

Throughout the dialog, default values are shown in square brackets ([ ]).

To cancel the configuration dialog, press CTRL-C, or you can let the dialog help you perform one of two configuration types:

  • Basic configuration setup configures only enough connectivity for management of the system.
  • Extended configuration setup asks you to configure each interface and is not appropriate for configuring the Cisco RFGW-10. You can run the setup facility any time you are at the enable prompt (#) by entering the setup command.

Configuring the System Using the Basic System Configuration Dialog

Complete the following steps to perform a basic configuration using the System Configuration Dialog:


Step 1 The dialog starts by asking if you want to continue with the configuration dialog. Enter Yes . To return to the enable prompt, enter No .

--- System Configuration Dialog ---
Continue with configuration dialog? [yes/no]: yes

Step 2 Enter Yes to perform a basic management setup. Enter No to perform an extended configuration setup.

Would you like to enter basic management setup? [yes/no]: yes

Step 3 Specify a hostname. The hostname becomes part of the Cisco IOS prompt.

Enter host name [Router]: my-router

Step 4 Specify a secret password. It appears in encrypted form in the configuration file.

Enter enable secret: my_secret

Step 5 Specify the enable password. It is used if you did not assign a secret password.

Enter enable password: my_password

Step 6 Specify the password to use for Telnet sessions.

Enter virtual terminal password: my_vt

Step 7 At the Configure System Management prompt, enter No .

Configure System Management? [yes/no]: no

Step 8 If you want to access the router using SNMP, enter Yes at the prompt:

Configure SNMP Network Management? [yes]: yes

Step 9 Specify an SNMP community string.

Community string [public]: public


 

Configuring a Switch using the Extended Configuration Mode

Complete the following steps to configure your switch from configuration mode:


Step 1 Connect a console terminal to the console interface of your supervisor card.

Step 2 After a few seconds, you will see the user EXEC prompt ( Switch> ). Now, you may want to enter privileged EXEC mode, also known as enable mode. Type enable to enter enable mode:

Switch> enable

Note You must be in enable mode to make configuration changes.


The prompt will change to the enable prompt (#):

Switch#

Step 3 At the enable prompt (#), enter the configure terminal command to enter global configuration mode:

Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#

Step 4 At the global configuration mode prompt, enter the interface { qam | qam-red } slot/port. [ channel ] command to enter interface configuration mode:

Switch(config)# interface qam 3/1
Switch(config-if)#

Step 5 Enter the end command to exit configuration mode.

Step 6 Save your settings.


 

Your switch is now minimally configured and can boot up. To see a list of the configuration commands, enter ‘ ?’ at the prompt or press the help key in configuration mode.

Configuring a Default Gateway

Configure a default gateway to send data to subnets other than its own when the switch is not configured with a routing protocol. The default gateway is also used for remote procedure call (RPC) communication to SDV and VOD servers. The default gateway must be the IP address of an interface on a router that is directly connected to the switch.


Note The switch uses the default gateway only when it is not configured with a routing protocol.


Complete the following steps to configure a default gateway:


Step 1 Configure a default gateway.

Switch(config)# ip default-gateway IP-address

Step 2 Verify that the default gateway is correctly displayed in the IP routing table.

Switch# show ip route

This example shows how to configure a default gateway and how to verify the configuration:

Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# ip default-gateway 172.20.52.35
Switch(config)# end
3d17h: %SYS-5-CONFIG_I: Configured from console by console
Switch# show ip route
Default gateway is 172.20.52.35
 
Host Gateway Last Use Total Uses Interface
ICMP redirect cache is empty
 

Configuring a Static Route

If your Telnet station or SNMP network management workstation is on a different network from your switch and a routing protocol has not been configured, you might need to add a static routing table entry for the network where your end station is located.

To configure a static route, use this procedure:


Step 1 Configure a static route to the remote network.

Switch(config)# ip route dest_IP_address mask {forwarding_IP | vlan vlan_ID}

Step 2 Verify that the static route is displayed correctly.

Switch# show running-config

This example shows how to use the ip route command to configure a static route to a workstation at IP address 171.10.5.10 on the switch with a subnet mask and IP address 172.20.3.35 of the forwarding router:

Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# ip route 171.10.5.10 255.255.255.255 172.20.3.35
Switch(config)# end

Controlling Access to Privileged EXEC Commands

The procedures in these sections let you control access to the system configuration file and privileged EXEC commands.

Setting or Changing a Static Enable Password

To set or change a static password that controls access to the enable mode, enter the enable password command:

Switch(config)# enable password password

This example shows how to configure the enable password “lab” in privileged EXEC mode:

Switch# configure terminal
Switch(config)# enable password lab

Using the enable password and enable secret Commands

To provide an additional layer of security, particularly for passwords used to connect outside your network or that are stored on a TFTP server, you can use either the enable password or enable secret commands. Both commands configure an encrypted password that you must enter to access the enable mode (the default) or any other privilege level that you specify.

We recommend that you use the enable secret command.

If you configure the enable secret command, it takes precedence over the enable password command; the two commands cannot be in effect simultaneously.

To configure the switch to require an enable password, issue either of the following commands:

Switch(config)# enable password [level level] {password | encryption-type encrypted-password}

The above command establishes a password for the privileged EXEC mode.

Switch(config)# enable secret [level level] {password | encryption-type encrypted-password}

The above command specifies a secret password that is saved using a nonreversible encryption method.


Note If the enable password and enable secret commands are both set, you must enter the secret password.


When you enter either of these password commands with the level keyword, you define a password for a specific privilege level. After you specify the level and set a password, provide the password only to the users who need to have access at this level. Use the privilege level configuration command to specify commands accessible at various levels.

If you configure the service password-encryption command, the password you enter is encrypted. When you display the password with the more system:running-config command, the password is displayed in the encrypted form.

If you specify an encryption type, you must provide an encrypted password—an encrypted password you copy from another Cisco RFGW-10 UEQAM configuration, so that the passwords are the same.


Note You cannot recover a lost encrypted password. You must clear NVRAM and set a new password.


Setting or Changing a Privileged Password

To set or change a privileged password, enter the password command:

Switch(config-line)# password password

Enabling multicast on the Cisco RFGW-10

Enabling IP multicast routing allows the Cisco IOS software to forward multicast packets. To enable IP multicast routing on the router, use the ip multicast-routing command in global configuration mode.

Router# configure terminal
Router(config)#ip multicast-routing
 

Saving Your Configuration Settings

To store the configuration or changes to your startup configuration in NVRAM, enter the copy running-config startup-config command at the Router# prompt:

Router# copy running-config startup-config
 

This command saves the configuration settings.


Tip If you do not save your settings, your configuration will be lost the next time you reload the router.


Reviewing your Configuration Settings

You can check your settings and review any changes to your configuration using various software commands:

  • To view information specific to the hardware and cable interface configuration on your Cisco RFGW-10, use the following show commands:

– Use this command to verify the downstream center frequency:

Router# show controllers qam {slot}/{port} downstream
 

– Use this command to check the value of the settings you entered:

Router# show running-config
 
  • To display the information stored in NVRAM, and to review changes you make to the configuration, use the EXEC show startup-config command.

Viewing Sample Configuration Files

This section displays examples of Cisco RFGW-10 configuration files. To view the current configuration of a Cisco RFGW-10, enter the show running-config command at the command-line interface (CLI) prompt in EXEC mode or privileged EXEC mode.

Router# show running-config
Load for five secs: 8%/0%; one minute: 12%; five minutes: 11%
Time source is hardware calendar, *15:32:17.342 PDT Mon Dec 7 2009
 
Building configuration...
 
Current configuration : 23719 bytes
!
version 15.0
no service pad
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
no service password-encryption
service compress-config
service heartbeat warning-timeout 3
service heartbeat fatal-timeout 5
service heartbeat cslipc-timeout 600
service heartbeat alive-timeout 600
!
hostname RFGW_SNOW
!
boot-start-marker
boot system tftp://10.197.89.23/SQD/rfgwk10-entservicesk9.03.05.01.SQ8.150-1.9.8.SQD01.bin
boot-end-marker
!
enable password cisco
!
username cisco privilege 15 password 0 cisco
!
!
no aaa new-model
clock timezone IST 5
!
cable downstream freq-profile annex-b-low
lane 1 start-freq 90000000
block 1 start-freq 90000000
block 2 start-freq 138000000
block 3 start-freq 186000000
block 4 start-freq 234000000
lane 2 start-freq 282000000
block 1 start-freq 282000000
block 2 start-freq 330000000
block 3 start-freq 378000000
block 4 start-freq 426000000
lane 3 start-freq 474000000
block 1 start-freq 474000000
block 2 start-freq 522000000
block 3 start-freq 570000000
block 4 start-freq 618000000
lane 4 start-freq 666000000
block 1 start-freq 666000000
block 2 start-freq 714000000
block 3 start-freq 762000000
block 4 start-freq 810000000
!
cable downstream freq-profile annex-b-high
lane 1 start-freq 234000000
block 1 start-freq 234000000
block 2 start-freq 282000000
block 3 start-freq 330000000
block 4 start-freq 378000000
lane 2 start-freq 426000000
block 1 start-freq 426000000
block 2 start-freq 474000000
block 3 start-freq 522000000
block 4 start-freq 570000000
lane 3 start-freq 618000000
block 1 start-freq 618000000
block 2 start-freq 666000000
block 3 start-freq 714000000
block 4 start-freq 762000000
lane 4 start-freq 810000000
block 1 start-freq 810000000
block 2 start-freq 858000000
block 3 start-freq 906000000
block 4 start-freq 954000000
!
cable downstream freq-profile annex-a-low
lane 1 start-freq 94000000
block 1 start-freq 94000000
block 2 start-freq 142000000
block 3 start-freq 190000000
block 4 start-freq 238000000
lane 2 start-freq 286000000
block 1 start-freq 286000000
block 2 start-freq 334000000
block 3 start-freq 382000000
block 4 start-freq 430000000
lane 3 start-freq 478000000
block 1 start-freq 478000000
block 2 start-freq 526000000
block 3 start-freq 574000000
block 4 start-freq 622000000
lane 4 start-freq 670000000
block 1 start-freq 670000000
block 2 start-freq 718000000
block 3 start-freq 766000000
block 4 start-freq 814000000
!
cable downstream freq-profile annex-a-high
lane 1 start-freq 235000000
block 1 start-freq 235000000
block 2 start-freq 283000000
block 3 start-freq 331000000
block 4 start-freq 379000000
lane 2 start-freq 427000000
block 1 start-freq 427000000
block 2 start-freq 475000000
block 3 start-freq 523000000
block 4 start-freq 571000000
lane 3 start-freq 619000000
block 1 start-freq 619000000
block 2 start-freq 667000000
block 3 start-freq 715000000
block 4 start-freq 763000000
lane 4 start-freq 811000000
block 1 start-freq 811000000
block 2 start-freq 859000000
block 3 start-freq 907000000
block 4 start-freq 955000000
!
cable downstream rf-profile default-rf-profile
cable downstream annex B
cable downstream modulation 256
cable downstream interleaver-depth option1 I32-J4 option2 I32-J4
cable downstream symbol-rate 5360537
!
cable downstream rf-profile rf-video
cable downstream annex A 6MHZ
cable downstream modulation 64
cable downstream interleaver-depth option1 I12-J17 option2 I12-J17
cable downstream symbol-rate 5271000
!
cable downstream rf-profile Annexa6mhz
cable downstream annex A 6MHZ
cable downstream modulation 256
cable downstream interleaver-depth option1 I12-J17 option2 I12-J17
cable downstream symbol-rate 5361000
!
cable downstream rf-profile rf-videoA_64
cable downstream annex A 6MHZ
cable downstream modulation 64
cable downstream interleaver-depth option1 I12-J17 option2 I12-J17
cable downstream symbol-rate 3500000
!
cable downstream rf-profile rf-videoB
cable downstream annex B
cable downstream modulation 256
cable downstream interleaver-depth option1 I32-J4 option2 I32-J4
cable downstream symbol-rate 7000000
!
cable downstream rf-profile rf-video1
cable downstream annex A
cable downstream modulation 256
cable downstream interleaver-depth option1 I12-J17 option2 I12-J17
cable downstream symbol-rate 6952000
!
cable downstream rf-profile rf-videoA_256
cable downstream annex A 6MHZ
cable downstream modulation 256
cable downstream interleaver-depth option1 I12-J17 option2 I12-J17
cable downstream symbol-rate 5271000
!
cable downstream rf-profile rf-video_B
cable downstream annex B
cable downstream modulation 256
cable downstream interleaver-depth option1 I64-J2 option2 I64-J2
cable downstream symbol-rate 5360537
!
l2tp-class vlan_10
retransmit retries 5
retransmit timeout max 5
!
ip subnet-zero
no ip domain-lookup
ip vrf Mgmt-vrf
!
ip multicast-routing
!
!
!
depi-class vlan_10
mode mpt
!
depi-tunnel vlan_10
dest-ip 192.168.21.2
l2tp-class vlan_10
depi-class vlan_10
!
!
power redundancy-mode redundant
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
cable qam-partition 1
protocol gqi
mgmt-ip 1.13.1.2
server 10.253.0.1
mac-address 4c4e.35cc.2980
active
!
cable qam-partition 3
protocol gqi
mgmt-ip 10.78.179.158
server 10.78.179.150
mac-address 4c4e.35cc.2981
active
!
exception coredump
!
redundancy
mode sso
linecard-group 0 internal-switch
class 1:N
reserve cardtype 0x6015
member slot 3 primary
member slot 11 secondary
no revertive
!
cable linecard 3 encryption pkey scrambler des
!
cable video multicast uplink TenGigabitEthernet 3/10 bandwidth 1000000
cable video labels
asm asm1 group 229.1.1.1 bitrate 2610000
ssm ssmsd1 source 20.0.1.1 group 232.2.2.31 bitrate 2510000
ssm ssmsd2 source 20.0.1.1 group 232.2.2.32 bitrate 2510000
ssm ssmsd3 source 20.0.1.1 group 232.2.2.33 bitrate 2510000
ssm ssmsd4 source 20.0.1.1 group 232.2.2.34 bitrate 2510000
ssm ssmsd5 source 20.0.1.1 group 232.2.2.35 bitrate 2510000
cable route linecard 3 load-balance-group 1
qam-partition 1 ip 40.0.1.10 gqi-ingress-port 1 bitrate 2000000
cable route linecard 3 load-balance-group 2
qam-partition 3 ip 2.13.1.2 gqi-ingress-port 2 bitrate 2000000
!
vlan internal allocation policy ascending
!
vlan 10,32
!
!
interface FastEthernet1
ip vrf forwarding Mgmt-vrf
no ip address
shutdown
speed auto
duplex auto
!
interface TenGigabitEthernet1/1
switchport access vlan 32
switchport mode access
!
interface TenGigabitEthernet1/2
!
interface TenGigabitEthernet1/3
!
interface TenGigabitEthernet1/4
!
interface TenGigabitEthernet2/1
!
interface TenGigabitEthernet2/2
!
interface TenGigabitEthernet2/3
!
interface TenGigabitEthernet2/4
!
interface Qam-red3/1
cable downstream max-carriers 32
cable downstream start-freq 143000000
!
interface Qam-red3/1.1
cable carrier-id 1
cable mode video remote encrypt
cable downstream lqam-group 1
cable downstream tsid 3001
cable downstream rf-profile rf-video_B
cable downstream rf-power 36.0
cable downstream frequency 255000000
no cable downstream rf-shutdown
cable downstream interleaver-depth I64-J2
cable partition 3 external-channel 1
!
interface Qam-red3/1.2
cable carrier-id 2
cable mode video remote encrypt
cable downstream lqam-group 1
cable downstream tsid 3002
cable downstream rf-profile rf-video_B
cable downstream frequency 261000000
no cable downstream rf-shutdown
cable downstream interleaver-depth I64-J2
cable partition 3 external-channel 2
!
interface Qam-red3/1.3
cable carrier-id 3
cable mode video remote encrypt
cable downstream lqam-group 1
cable downstream tsid 3003
cable downstream rf-profile rf-video_B
cable downstream frequency 267000000
no cable downstream rf-shutdown
cable downstream interleaver-depth I64-J2
cable partition 3 external-channel 3
!
interface Qam-red3/1.4
cable carrier-id 4
cable mode video remote encrypt
cable downstream lqam-group 1
cable downstream tsid 3004
cable downstream rf-profile rf-video_B
cable downstream frequency 273000000
no cable downstream rf-shutdown
cable downstream interleaver-depth I64-J2
cable partition 3 external-channel 4
!
interface Qam-red3/1.5
cable carrier-id 5
cable mode video remote encrypt
cable downstream lqam-group 1
cable downstream tsid 3005
cable downstream rf-profile rf-video_B
cable downstream frequency 279000000
no cable downstream rf-shutdown
cable downstream interleaver-depth I64-J2
cable partition 1 external-channel 1
!
interface Qam-red3/1.6
cable carrier-id 6
cable mode video remote encrypt
cable downstream lqam-group 1
cable downstream tsid 3006
cable downstream rf-profile rf-video_B
cable downstream frequency 285000000
no cable downstream rf-shutdown
cable downstream interleaver-depth I64-J2
cable partition 1 external-channel 2
!
interface Qam-red3/1.7
cable carrier-id 7
cable mode video remote encrypt
cable downstream lqam-group 1
cable downstream tsid 3007
cable downstream rf-profile rf-video_B
cable downstream frequency 291000000
no cable downstream rf-shutdown
cable downstream interleaver-depth I64-J2
cable partition 1 external-channel 3
!
interface Qam-red3/1.8
cable carrier-id 8
cable mode video remote encrypt
cable downstream lqam-group 1
cable downstream tsid 3008
cable downstream rf-profile rf-video_B
cable downstream frequency 297000000
no cable downstream rf-shutdown
cable downstream interleaver-depth I64-J2
cable partition 1 external-channel 4
!
interface Qam-red3/1.9
cable carrier-id 9
cable mode video remote encrypt
cable downstream lqam-group 2
cable downstream tsid 3009
cable downstream rf-profile rf-video_B
cable downstream frequency 303000000
no cable downstream rf-shutdown
cable downstream interleaver-depth I64-J2
cable partition 1 external-channel 5
!
interface Qam-red3/1.10
cable carrier-id 10
cable mode video remote encrypt
cable downstream lqam-group 2
cable downstream tsid 3010
cable downstream rf-profile rf-video_B
cable downstream frequency 309000000
no cable downstream rf-shutdown
cable downstream interleaver-depth I64-J2
cable partition 1 external-channel 6
!
interface Qam-red3/1.11
cable carrier-id 11
cable mode video remote encrypt
cable downstream lqam-group 2
cable downstream tsid 3011
cable downstream rf-profile rf-video_B
cable downstream frequency 315000000
no cable downstream rf-shutdown
cable downstream interleaver-depth I64-J2
cable partition 1 external-channel 7
!
interface Qam-red3/1.12
cable carrier-id 12
cable mode video remote encrypt
cable downstream lqam-group 2
cable downstream tsid 3012
cable downstream rf-profile rf-video_B
cable downstream frequency 321000000
no cable downstream rf-shutdown
cable downstream interleaver-depth I64-J2
cable partition 1 external-channel 8
!
interface Qam-red3/1.13
cable carrier-id 13
cable mode video remote encrypt
cable downstream lqam-group 2
cable downstream tsid 3013
cable downstream rf-profile rf-video_B
cable downstream frequency 327000000
no cable downstream rf-shutdown
cable downstream interleaver-depth I64-J2
cable partition 1 external-channel 9
!
interface Qam-red3/1.14
cable carrier-id 14
cable mode video remote encrypt
cable downstream lqam-group 2
cable downstream tsid 3014
cable downstream rf-profile rf-video_B
cable downstream frequency 333000000
no cable downstream rf-shutdown
cable downstream interleaver-depth I64-J2
cable partition 1 external-channel 10
!
interface Qam-red3/1.15
cable carrier-id 15
cable mode video remote encrypt
cable downstream lqam-group 2
cable downstream tsid 3015
cable downstream rf-profile rf-video_B
cable downstream frequency 339000000
no cable downstream rf-shutdown
cable downstream interleaver-depth I64-J2
cable partition 1 external-channel 11
!
interface Qam-red3/1.16
cable carrier-id 16
cable mode video remote encrypt
cable downstream lqam-group 2
cable downstream tsid 3016
cable downstream rf-profile rf-video_B
cable downstream frequency 345000000
no cable downstream rf-shutdown
cable downstream interleaver-depth I64-J2
cable partition 1 external-channel 12
!
interface Qam-red3/1.17
cable carrier-id 17
cable mode depi remote learn
cable downstream lqam-group 3
cable downstream tsid 1
depi depi-tunnel vlan_10
!
interface Qam-red3/1.18
cable carrier-id 18
cable mode depi remote learn
cable downstream lqam-group 3
cable downstream tsid 2
depi depi-tunnel vlan_10
!
interface Qam-red3/1.19
cable carrier-id 19
cable mode depi remote learn
cable downstream lqam-group 3
cable downstream tsid 3
depi depi-tunnel vlan_10
!
interface Qam-red3/1.20
cable carrier-id 20
cable mode depi remote learn
cable downstream lqam-group 3
cable downstream tsid 4
depi depi-tunnel vlan_10
!
interface Qam-red3/1.21
cable carrier-id 21
cable mode depi remote learn
cable downstream lqam-group 3
cable downstream tsid 5
depi depi-tunnel vlan_10
!
interface Qam-red3/1.22
cable carrier-id 22
cable mode depi remote learn
cable downstream lqam-group 3
cable downstream tsid 6
depi depi-tunnel vlan_10
!
interface Qam-red3/1.23
cable carrier-id 23
cable mode depi remote learn
cable downstream lqam-group 3
cable downstream tsid 7
depi depi-tunnel vlan_10
!
interface Qam-red3/1.24
cable carrier-id 24
cable mode depi remote learn
cable downstream lqam-group 3
cable downstream tsid 8
depi depi-tunnel vlan_10
!
interface Qam-red3/1.25
cable carrier-id 25
cable mode depi remote learn
cable downstream lqam-group 4
cable downstream tsid 9
depi depi-tunnel vlan_10
!
interface Qam-red3/1.26
cable carrier-id 26
cable mode depi remote learn
cable downstream lqam-group 4
cable downstream tsid 10
depi depi-tunnel vlan_10
!
interface Qam-red3/1.27
cable carrier-id 27
cable mode depi remote learn
cable downstream lqam-group 4
cable downstream tsid 11
depi depi-tunnel vlan_10
!
interface Qam-red3/1.28
cable carrier-id 28
cable mode depi remote learn
cable downstream lqam-group 4
cable downstream tsid 12
depi depi-tunnel vlan_10
!
interface Qam-red3/1.29
cable carrier-id 29
cable mode depi remote learn
cable downstream lqam-group 4
cable downstream tsid 13
depi depi-tunnel vlan_10
!
interface Qam-red3/1.30
cable carrier-id 30
cable mode depi remote learn
cable downstream lqam-group 4
cable downstream tsid 14
depi depi-tunnel vlan_10
!
interface Qam-red3/1.31
cable carrier-id 31
cable mode depi remote learn
cable downstream lqam-group 4
cable downstream tsid 15
depi depi-tunnel vlan_10
!
interface Qam-red3/1.32
cable carrier-id 32
cable mode depi remote learn
cable downstream lqam-group 4
cable downstream tsid 16
depi depi-tunnel vlan_10
!
interface Qam-red3/2
cable downstream start-freq 143000000
!
interface Qam-red3/3
cable downstream start-freq 143000000
!
interface Qam-red3/4
cable downstream start-freq 143000000
!
interface Qam-red3/5
cable downstream start-freq 143000000
!
interface Qam-red3/6
cable downstream start-freq 143000000
!
interface Qam-red3/7
cable downstream start-freq 143000000
!
interface Qam-red3/8
cable downstream start-freq 143000000
!
!
interface TenGigabitEthernet3/9
description QAM Partition Mgmt
no switchport
ip address 1.13.1.2 255.255.255.0
no ip redirects
load-interval 30
carrier-delay msec 300
 
!
interface TenGigabitEthernet3/10
description SDV Video Streaming
no switchport
ip address 2.13.1.2 255.255.255.0
no ip redirects
ip pim sparse-dense-mode
load-interval 30
carrier-delay msec 300
!
interface GigabitEthernet3/11
switchport access vlan 10
switchport mode access
!
interface GigabitEthernet3/12
!
interface Asi3/13
!
interface GigabitEthernet3/16
!
interface TenGigabitEthernet11/9
description VOD Video Streaming
no switchport
ip address 40.0.1.40 255.255.255.0 secondary
ip address 40.0.1.10 255.255.255.0
no ip redirects
load-interval 30
carrier-delay msec 500
!
interface TenGigabitEthernet11/10
!
interface GigabitEthernet11/11
!
interface GigabitEthernet11/12
!
interface Asi11/13
!
interface GigabitEthernet11/16
!
interface Vlan1
no ip address
!
interface Vlan10
ip address 192.168.21.1 255.255.255.252
!
interface Vlan32
ip address 10.78.179.158 255.255.255.128 secondary
ip address 10.78.179.157 255.255.255.128 secondary
ip address 10.78.179.159 255.255.255.128 secondary
ip address 10.78.179.156 255.255.255.128
no ip redirects
!
ip default-gateway 10.78.179.129
ip route 10.78.152.0 255.255.252.0 10.78.179.129
ip route 10.253.0.0 255.255.255.0 1.13.1.1
ip route 176.1.1.0 255.255.255.240 2.13.1.1
ip route 176.1.1.0 255.255.255.240 2.13.2.1
ip route 192.168.10.0 255.255.255.0 1.13.2.1
ip route 192.168.14.0 255.255.255.0 2.13.2.1
ip route 192.168.14.0 255.255.255.0 1.13.2.1
ip http server
ip http authentication local
no ip http secure-server
!
ip pim ssm range all-multicasts
ip rpc portmapper
!
ip access-list standard all-multicasts
permit 232.0.0.0 0.255.255.255
permit 233.0.0.0 0.255.255.255
permit 234.0.0.0 0.255.255.255
permit 235.0.0.0 0.255.255.255
permit 236.0.0.0 0.255.255.255
permit 237.0.0.0 0.255.255.255
permit 238.0.0.0 0.255.255.255
permit 224.0.0.0 0.255.255.255
permit 239.0.0.0 0.255.255.255
!
!
logging alarm minor
!
snmp-server community public RO
snmp-server community private RW
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server host 10.78.179.150 version 2c public udp-port 8999
!
banner lcd RFGW-10
!
line con 0
exec-timeout 0 0
stopbits 1
line vty 0 4
exec-timeout 0 0
privilege level 15
password cisco
login
length 0
transport input all
transport output all
!
cable clock dti-server-type symmetricom
!
end