10 glossary – H3C Technologies H3C Intelligent Management Center User Manual

Page 138

Advertising
background image

129

10 Glossary

Ack status

Acknowledged status of an alarm. This can be Acknowledged or Unacknowledged.

ACS

Auto-Configuration Server. The server that interacts with the CPE and uses the CWMP to

manage the CPE. In BIMS, there is an ACS in each BIMS background. You can deploy
multiple ACSs in a distributed way, each of which manages a certain number of CPEs, thus

expanding the management capacity. ACS servers interact and synchronize data through the

JGroup protocol.

ACS URL

URL of the ACS used for managing CPEs, in the format of http://host:port, where host is the

host name or IP address of the ACS server, and the port is 9090 by default.

ACS username

and password

The username and passwor1 d that the CPE uses to access the ACS. Upon receiving the

connection request from the CPE, the ACS can use the ACS username and password of the

CPE to authenticate the CPE in the following order:

If the username and password of the CPE match those configured for a user in the authentication
user list, the CPE passes the authentication.

If BIMS uses the common password, the CPE passes the authentication if the ACS password is the
same as the common password.

Otherwise, the authentication fails.

Alarm level

Identifies the severity of an alarm, including Critical, Major, Minor, Warning, and Event in the

descending severity order. The status of a CPE depends on the highest level of alarm it raises.

Common version See

Make baseline

.

CPE

Customer Premises Equipment. A device supporting TR-069. CPEs are usually at the access
layer (edge) of a network, including ADSL devices, broadband routers, TV top-sets, WLAN

APs, IP phones, and so on. Upon receiving the TR-069 request from the background of BIMS,

the CPE performs the corresponding operation and returns the response.

CWMP

CPE WAN Management Protocol. A technical specification developed by Digital Subscribers

Line (DSL). Also known as TR-069. It provides the general architecture, message specification,
management method, and data model for the management and configuration of the home

network CPEs in the next-generation network. CWMP is usually used in DSL access networks.

DHCP

Dynamic Host Configuration Protocol. A network protocol used to configure network devices

so that they can communicate on an IP network. DHCP automates network-parameter
assignment to network devices from one or more DHCP servers. DHCP provides an extensible

framework through which a host can acquire various configuration parameters from a

centrally managed server, including (among others) the host's IP address, subnet mask,

default router, DNS domain, DNS server, and NTP servers.

DHCP spoofed

An attack on a DHCP server to obtain IP addresses using spoofed (falsified) DHCP messages.

BIMS can be configured to protect against DHCP spoofed messages using key or

token-based authentication protocols to prevent unauthorized senders from accessing the

network.

DNS

Domain Name System. A hierarchical distributed naming system for computers, services, or

any resource connected to the Internet or a private network.

Advertising