27.03.2013 Views

Cisco Broadband Cable Command Reference Guide

Cisco Broadband Cable Command Reference Guide

Cisco Broadband Cable Command Reference Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 5 <strong>Cable</strong> CPE <strong>Command</strong>s<br />

debug cable-modem bpkm<br />

Syntax Description:<br />

<strong>Command</strong> Modes Privileged EXEC<br />

<strong>Command</strong> History<br />

OL-1581-05<br />

debug cable-modem bpkm<br />

To display information about Baseline Privacy Interface (BPI) key management, use the debug<br />

cable-modem bpkm command in privileged EXEC mode. To disable BPI debugging, use the no form<br />

of this command.<br />

<strong>Cisco</strong> uBR904, uBR905, uBR924, uBR925 cable access routers, <strong>Cisco</strong> CVA122 <strong>Cable</strong> Voice Adapter<br />

debug cable-modem bpkm {errors | events | packets}<br />

no debug cable-modem bpkm {errors | events | packets}<br />

errors Debugs CM privacy errors.<br />

events Debugs events related to cable baseline privacy.<br />

packets Debugs baseline privacy packets.<br />

Release Modification<br />

11.3(4)NA This command was introduced for the <strong>Cisco</strong> uBR904 cable access router.<br />

12.0(4)XI1 Support was added for the <strong>Cisco</strong> uBR924 cable access router.<br />

12.0(5), 12.0(5)T This command was removed from normal access.<br />

Usage <strong>Guide</strong>lines Baseline privacy key management exchanges take place only when both the router and the CMTS are<br />

running code images that support baseline privacy, and the privacy class of service is enabled via the<br />

configuration file that is downloaded to the cable access router. Baseline privacy code images for the<br />

router contain k1, k8, or k9 in the code image name.<br />

In <strong>Cisco</strong> IOS Release 12.0(5) and later releases, this command is available only under the direction of<br />

TAC or field service, and should be used only while debugging CM operation. Displaying debugging<br />

messages consumes system resources, and turning on too many messages could negatively affect system<br />

performance.<br />

Examples The following example shows typical debug output when the CMTS does not have privacy enabled:<br />

Router# debug cable-modem bpkm errors<br />

cm_bpkm_fsm(): machine: KEK, event/state: EVENT_4_TIMEOUT/STATE_B_AUTH_WAIT, new state:<br />

STATE_B_AUTH_WAIT<br />

cm_bpkm_fsm(): machine: KEK, event/state: EVENT_4_TIMEOUT/STATE_B_AUTH_WAIT, new state:<br />

STATE_B_AUTH_WAIT<br />

%LINEPROTO-5-UPDOWN: Line protocol on Interface cable-modem0, changed state to down<br />

cm_bpkm_fsm(): machine: KEK, event/state: EVENT_1_PROVISIONED/STATE_A_START, new state:<br />

STATE_B_AUTH_WAIT<br />

<strong>Cisco</strong> <strong>Broadband</strong> <strong>Cable</strong> <strong>Command</strong> <strong>Reference</strong> <strong>Guide</strong><br />

5-169

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!