HP Intelligent Management Center v5.2 Branch Intelligent Management System Administrator Guide
Glossary
Ack status Acknowledged status of an alarm. This can be Acknowledged or Unacknowledged.
ACS Auto-Configuration Server. The server that interacts with the CPE and uses the CWMP to manage
the CPE. In BIMS, there is an ACS in each BIMS background. You can deploy multiple ACSs in
a distributed way, each of which manages a certain number of CPEs, thus expanding the
management capacity. ACS servers interact and synchronize data through the JGroup protocol.
ACS URL URL of the ACS used for managing CPEs, in the format of http://host:port, where host is the host
name or IP address of the ACS server, and the port is 9090 by default.
ACS username and
password
The username and password that the CPE uses to access the ACS. Upon receiving the connection
request from the CPE, the ACS can use the ACS username and password of the CPE to authenticate
the CPE in the following order:
• If the username and password of the CPE match those configured for a user in the
authentication user list, the CPE passes the authentication.
• If BIMS uses the common password, the CPE passes the authentication if the ACS password
is the same as the common password.
• Otherwise, the authentication fails.
Alarm level Identifies the severity of an alarm, including Critical, Major, Minor, Warning, and Event in the
descending severity order. The status of a CPE depends on the highest level of alarm it raises.
Common version See Make baseline.
CPE Customer Premises Equipment. A device supporting TR-069. CPEs are usually at the access layer
(edge) of a network, including ADSL devices, broadband routers, TV top-sets, WLAN APs, IP
phones, and so on. Upon receiving the TR-069 request from the background of BIMS, the CPE
performs the corresponding operation and returns the response.
CWMP CPE WAN Management Protocol. A technical specification developed by Digital Subscribers
Line (DSL). Also known as TR-069. It provides the general architecture, message specification,
management method, and data model for the management and configuration of the home network
CPEs in the next-generation network. CWMP is usually used in DSL access networks.
DHCP Dynamic Host Configuration Protocol. A network protocol used to configure network devices so
that they can communicate on an IP network. DHCP automates network-parameter assignment to
network devices from one or more DHCP servers. DHCP provides an extensible framework through
which a host can acquire various configuration parameters from a centrally managed server,
including (among others) the host's IP address, subnet mask, default router, DNS domain, DNS
server, and NTP servers.
DHCP spoofed An attack on a DHCP server to obtain IP addresses using spoofed (falsified) DHCP messages.
BIMS can be configured to protect against DHCP spoofed messages using key or token-based
authentication protocols to prevent unauthorized senders from accessing the network.
DNS Domain Name System. A hierarchical distributed naming system for computers, services, or any
resource connected to the Internet or a private network.
DSL Digital Subscriber Line. A class of technologies that provide Internet access by transmitting digital
data over a local telephone network. DSL implementations in BIMS may create bridged or routed
networks. In a bridged configuration, the group of subscriber computers connect into a single
subnet. It can use DHCP to provide network details, such as the IP address to the subscriber
equipment, with authentication via MAC address or an assigned host name. It can also use PPP
or PPP over Ethernet (PPPoE), while authenticating with a user ID and password, and using
Point-to-Point Protocol (PPP) mechanisms to provide network details.
Group A set of CPEs organized according to a certain rule (such as location) for easy network
management.
L2TP Layer 2 Tunneling Protocol. Facilitates the tunneling of PPP data packets across an intervening
packet-switched network. An L2TP tunnel can extend across an entire PPP session or only across
one segment of a two-segment session. At the time of setup of an L2TP connection, many control
packets are exchanged between server and client to establish a tunnel and session for each
129