HP Intelligent Management Center v5.2 Branch Intelligent Management System User Guide

Standard terms, abbreviations and acronyms
Ack status The Ack status of an alarm can be Acknowledged or Unacknowledged.
ACS Auto-Configuration Server (ACS) is the server that interacts with the CPE and uses the CWMP to
manage the CPE. In BIMS, there is an ACS in each BIMS background. You can deploy multiple
ACSs in a distributed way, each of which manages a certain number of CPEs, thus expanding
the management capacity. ACS servers interact and synchronize data through the JGroup protocol.
ACS URL URL of the ACS used for managing CPEs, in the format of http://host:port, where host is the host
name or IP address of the ACS server, and the port is 9090 by default.
ACS username and
password
The username and password that the CPE uses to access the ACS. Upon receiving the connection
request from the CPE, the ACS can use the ACS username and password of the CPE to authenticate
the CPE in the following order: 1. If the username and password of the CPE match those configured
for a user in the authentication user list, the CPE passes the authentication; 2. If BIMS uses the
common password, the CPE passes the authentication if the ACS password is the same as the
common password; 3. Otherwise, the authentication fails.
Alarm level Alarm level identifies the severity of an alarm, which includes Critical, Major, Minor, Warning,
and Event in the descending severity order. The status of a CPE depends on the highest level of
alarm it raised
CPE Customer Premises Equipment (CPE) is a device supporting TR-069. CPEs are usually at the access
layer (edge) of a network, including ADSL devices, broadband routers, TV top-sets, WLAN APs,
IP phones, and so on. Upon receiving the TR-069 request from the background of BIMS, the CPE
performs the corresponding operation and returns the response.
CWMP CPE WAN Management Protocol (CWMP) is a technical specification developed by Digital
Subscribers Line (DSL). Also known as TR-069. It provides the general architecture, message
specification, management method, and data model for the management and configuration of
the home network CPEs in the next-generation network. CWMP is usually used in DSL access
networks.
DHCP Dynamic Host Configuration Protocol. A network protocol that is used to configure network devices
so that they can communicate on an IP network. DHCP automates network-parameter assignment
to network devices from one or more DHCP servers. DHCP provides an extensible framework
through which a host can acquire various configuration parameters from a centrally managed
server, including (among others) the host's IP address, subnet mask, default router, DNS domain,
DNS server and NTP servers.
DHCP Spoofed An attack on a DHCP server to obtain IP addresses using spoofed (falsified) DHCP messages.
BIMS can be configured to protect against DHCP spoofed messages using key or token-based
authentication protocols to prevent unauthorized senders from accessing the network.
DNS Domain Name System. A hierarchical distributed naming system for computers, services, or any
resource connected to the Internet or a private network.
DSL Digital Subscriber Line. A class of technologies that provide internet access by transmitting digital
data over a local telephone network. DSL implementations in BIMS may create bridged or routed
networks. In a bridged configuration, the group of subscriber computers connect into a single
subnet. It can use DHCP to provide network details such as the IP address to the subscriber
equipment, with authentication via MAC address or an assigned host name. It can also use PPP
or PPP over Ethernet (PPPoE) , while authenticating with a userid and password and using
Point-to-Point Protocol (PPP) mechanisms to provide network details.
Group A group is a set of CPEs organized according to a certain rule (such as location) for easy network
management.
H3C/HP H3C Technologies Co., Limited (H3C) is a wholly owned subsidiary of Hewlett-Packard Company
(HP). They produce networking products and solutions, including routers, LAN switches, network
security, WAN, intelligent management software, etc., which are sold world-wide.
IP Internet Protocol
nl
nl
nl
L2TP Layer 2 Tunneling Protocol. Facilitates the tunneling of PPP data packets across an intervening
packet-switched network. An L2TP tunnel can extend across an entire PPP session or only across
63