Chapter 18: Baseline Privacy Interface (BPI)
STANDARD Revision 1.0 C4® CMTS Release 8.3 User Guide
© 2016 ARRIS Enterprises LLC. All Rights Reserved. 587
Initialization
Reauthorization and rekeying.
Registration
At registration, the modem receives operational parameters from the CM’s configuration file. The C4/c CMTS verifies that
these parameters, if present in the CM’s registration request message, are in range.
There is one specific message TLV, type 17, which contains the Baseline Privacy operational parameters. The progression of
registration is the same for BPI and BPI+, but BPI+ has different requirements.
Caution: BPI operation requires ALL type 17 BPI parameters to exist and be within range for registration to complete and
accept the BPI portion of registration.
Note: BPI+ is much less restrictive: some, all, or no type 17 parameters need to exist for the BPI portion of registration to
complete. For BPI+ registration, any values that are not specifically defined in the configuration file are defaulted to the
values defined in the BPI+ Specification, Appendix A, in the Recommended Operational Ranges for BPI Configuration
Parameters table.
Initialization
After registration is complete, and Baseline Privacy is enabled, the second operational step of Baseline Privacy initialization
begins. It begins by authorizing the CM to use specific flows and is then followed by the transferring of traffic key
information for each specific flow.
BPI+ performs the same BPKM sequence as BPI with the addition of an initial digital certificate information message which
is used in modem authentication.
A successful initialization sequence proceeds as follows:
1. The CM authorizes with the C4/c CMTS through the use of BPKM authorization messages.
The first message that a CM sends is an authentication information message to the C4/c CMTS. (BPI+ only)
The second message is the Authorization Request.
The third message is the Authorization Reply from the C4/c CMTS.