Newtec Proprietary
Confidentiality: Unrestricted
R3.2_v1.0
Table of Contents
MDM9000 Satellite Modem
16.11.3.4 Traffic Shaping ........................................................................................................................ 251
16.11.3.5 Traffic Classification ................................................................................................................ 254
16.11.4 QOS Rule to Drop Incoming Traffic ............................................................................................... 256
16.12 Stream Decapsulation ......................................................................................................................... 258
16.12.1 Decapsulation General Settings .................................................................................................... 258
16.12.2 Configure the TS Decapsulator ..................................................................................................... 260
16.12.2.1 Configure the TS Decapsulation ISIs ...................................................................................... 260
16.12.2.2 Configure the PIDs Decapsulation .......................................................................................... 261
16.12.2.3 Configure the Channels .......................................................................................................... 262
16.12.3 Monitoring ...................................................................................................................................... 263
16.13 Test Traffic Generator and Monitoring ................................................................................................. 264
16.13.1 Test Traffic Generator .................................................................................................................... 264
16.13.2 Test Traffic Monitoring ................................................................................................................... 266
16.14 Transparent BBF over IP ..................................................................................................................... 268
16.15 In-band Remote Management ............................................................................................................. 270
16.15.1 How to Configure the In-band Management Feature ..................................................................... 271
16.15.1.1 Hub Site .................................................................................................................................. 271
16.15.1.2 Remote Site ............................................................................................................................ 272
16.15.2 Example ......................................................................................................................................... 272
16.15.2.1 Configure the Hub Site ............................................................................................................ 273
16.15.2.2 Configure the Remote Site ...................................................................................................... 276
16.16 Bandwidth Cancellation ....................................................................................................................... 277
16.16.1 Block Diagram ................................................................................................................................ 278
16.16.2 Configuration and Monitoring Parameters ..................................................................................... 279
16.16.3 Practical Use Case ......................................................................................................................... 285
16.16.3.1 Configure the Hub Site ............................................................................................................ 286
16.16.3.2 Configure the Remote Site ...................................................................................................... 289
16.17 Layer 2 VLAN Termination .................................................................................................................. 291
16.17.1 Introduction .................................................................................................................................... 291
16.17.2 Access VLAN Mechanism between Hub and Remote Sites ......................................................... 292
16.17.3 Access VLAN Mechanism between Remote and Hub .................................................................. 294
16.18 Configure AES Content Protection ...................................................................................................... 296
16.18.1 Content Protection ......................................................................................................................... 297
16.18.2 Key Management ........................................................................................................................... 297
16.18.2.1 Overview ................................................................................................................................. 297
16.18.2.2 Key Management System Structure ....................................................................................... 298
16.18.2.3 Key Sizes ................................................................................................................................ 299
16.18.2.4 Use of Group Key .................................................................................................................... 299
16.18.2.5 Seamless Key Change ........................................................................................................... 299
16.18.2.6 Global Protection or Protection per Stream ............................................................................. 300