Fraud Prevention in DOCSIS Networks: Security Roles

In this final post on fraud protection in DOCSIS networks, let’s examine how security roles in the Incognito solution can be utilized to prevent service theft.

Administrative Security

Administrator Accounts

Administrator accounts enable you to set up users that function in different assigned security roles:

  • Super User: Super user accounts always have access to all aspects of the DHCP service configuration. This access cannot be removed or restricted by any other security settings or Access Control Lists.

  • Account Administrator: Only super users and account administrators are able to add, modify or delete existing accounts, with one exception: every user can change his or her own password from the File –> Change Password menu item

  • Service Manager: Only super users and users with this attribute set can access service configuration and operations

In addition to the security roles, the DHCP service also supports specific database access privileges. User can be set to have either “read-only” or “manage” access to specific service features.

Continue Reading
  • Share:

Fraud Prevention in DOCSIS Network: Securing Your Platform

Enabling additional features in the Incognito fraud protection solution will go a long way to securing your DOCSIS network from service theft.

Anti-Roaming

Anti-Roaming devices enable you to restrict roaming on particular devices attached to the network. Anti-Roaming only has an effect for IP phishing/device ID cloning, when the cloned MAC is on a different CMTS. In the majority of cases, the cloned MAC will be on the same CMTS, as it’s likely the person cloning the MAC will be on the same local network by using a network sniffer to obtain the MAC.

Continue Reading
  • Share:

Fraud Prevention in DOCSIS Network: Data Sharing

We previously looked at the layers of security required to protect MSPs from theft of service. In this Tips & Tutorial, we’ll dive deeper into how the Incognito solution offers fraud protection with data sharing.

DHCP and CFM Data Sharing for Fraud Protection

The DHCP service shares what is known about the client with the configuration file management (CFM) service by creating a unique filename for the settings required for the device. This data is then stored in a table on the CFM service for 60 seconds, waiting for the modem request, after which it is deleted.

When the modem contacts the CFM service, it requests its configuration file by the name created by DHCP, and CFM looks up the file settings in its table. The file is then generated on request.

Continue Reading
  • Share:

The CLI Cheat Sheet: Add and modify client classes

Command Line Interface (CLI) is a useful tool for network administrators with access to the back end of Incognito Software products. This guide provides seven useful tips on how to CLI can be used to improve operational efficiency in Broadband Command Center, a DHCP provisioning solution from Incognito Software.

Add and modify client classes

You can create and modify a client class through the DHCP service. Note that administrators that use MPS for their subscriber management will use that service’s CLI to manipulate Client Class membership. This section will discuss Client Class modification via DHCP only.

When working with a client class, the basic commands that can be used are:

Continue Reading
  • Share:

The CLI Cheat Sheet: Set config.txt Variables

Command Line Interface (CLI) is a useful tool for network administrators with access to the back end of Incognito Software products. This guide provides seven useful tips on how to CLI can be used to improve operational efficiency in Broadband Command Center, a DHCP provisioning solution from Incognito Software.

Set config.txt Variables

Any variable that can be found in the config.txt file can be set via CLI using the following format:

Continue Reading
  • Share:

The CLI Cheat Sheet: Add DOCSIS files to DHCP

Command Line Interface (CLI) is a useful tool for network administrators with access to the back end of Incognito Software products. This guide provides seven useful tips on how to CLI can be used to improve operational efficiency in Broadband Command Center, a DHCP provisioning solution from Incognito Software.

Add DOCSIS files to DHCP

When working with a DOCSIS configuration file, the basic commands that can be used are:

Continue Reading
  • Share:

The CLI Cheat Sheet: Add DHCP Rules

Command Line Interface (CLI) is a useful tool for network administrators with access to the back end of Incognito Software products. This guide provides seven useful tips on how to CLI can be used to improve operational efficiency in Broadband Command Center, a DHCP provisioning solution from Incognito Software.

Add a DHCPv4 rule to the DHCP service:

Continue Reading
  • Share: