Digital Experience
IP Resource Management
Subscriber Insights
Industry Report
Unlock new broadband value opportunities—get the Future of the Connected Home report.
Resource Orchestration
Service Orchestration
Industry Report
Unlock new broadband value opportunities—get the Future of the Connected Home report.
Incognito Plus
Boost performance, reduce downtime, and strengthen your operations. Explore Incognito's Managed Services.
Company Info
Partner Program
Career Opportunities
Join a growing team shaping the future of broadband. Explore Incognito's open positions.
Enhance DOCSIS network security with dynamic configuration files, IP verification, and anti-spoofing mechanisms to protect cable modem provisioning and prevent unauthorized access.
Published on 21 May 2015
As an overview, these features include:
IP Verification: Only the intended cable modem identified as originating from the associated IP address may download the configuration file
Single Download Only: The configuration file may only be downloaded once
Randomly Generated Filenames: The configuration filename is a randomly generated hex string created on-the-fly during the DHCP process, which eliminates the possibility of guessing configuration filenames
Configuration File Expiry: If a configuration file is not downloaded, the filename and related information regarding that file are destroyed after a configurable amount of time (default: 60 seconds)
TLV 19 and 20: The solution offers the ability to include TFTP Timestamp and cable modem IP in configuration files
The above features provide much-needed security functionality:
Two TLVs aid in security and can only be used when dynamically generating files, as the values are for the TLVs can only be determined at download time. These are:
CFM Server Timestamp (TLV 19): Sending time of the configuration file, in seconds, as defined in RFC 868, used to prevent replay attacks with the old configuration files
CFM Server Provisioned Modem Address (TLV 20): The IP address of the modem requesting the configuration file, to prevent IP spoofing during registration