SlideShare a Scribd company logo
1 of 26
Download to read offline
More Details about
TR-069
CPE WAN Management Protocol
William.L
wiliwe@gmail.com
2005-11-28
Index
SUMMARYSUMMARYSUMMARYSUMMARY .................................................................................................................................................................................................................................................................... 3333
GENERAL DESCRIPTION................................................................................................................................................3
TERMINOLOGYTERMINOLOGYTERMINOLOGYTERMINOLOGY .................................................................................................................................................................................................................................................... 4444
B-NT : BROADBAND NETWORK TERMINATION....................................................................................................................4
CPE : CUSTOMER PRIMISE EQUIPMENT ............................................................................................................................4
DSLAM : DIGITAL SUBSCRIBER LINE ACCESS MULTIPLEXER...................................................................................................4
BRAS : BROADBAND REMOTE ACCESS SERVER...................................................................................................................4
ACS : AUTO-CONFIGURATION SERVER .............................................................................................................................4
IGD : INTERNET GATEWAY DEVICE .................................................................................................................................4
RPC : REMOTE PROCEDURE CALL ...................................................................................................................................4
PARAMETER...............................................................................................................................................................4
SESSION...................................................................................................................................................................4
VOUCHER .................................................................................................................................................................5
OUI : ORGANIZATIONALLY UNIQUE IDENTIFIER..................................................................................................................5
FUNCTIONAL COMPONENTFUNCTIONAL COMPONENTFUNCTIONAL COMPONENTFUNCTIONAL COMPONENTSSSS ............................................................................................................................................................................................................ 6666
AUTO-CONFIGURATION AND DYNAMIC SERVICE PROVISIONING...............................................................................................6
SOFTWARE/FIRMWARE IMAGE MANAGEMENT .....................................................................................................................6
STATUS AND PERFORMANCE MONITORING .........................................................................................................................6
DIAGNOSTICS ............................................................................................................................................................6
POSITIONING IN THE AUTO-CONFIGURATION ARCHITECTURE .................................................................................................7
ASSUMPTIONS............................................................................................................................................................8
USE OF PROTOCOLSUSE OF PROTOCOLSUSE OF PROTOCOLSUSE OF PROTOCOLS ................................................................................................................................................................................................................................ 9999
PROTOCOL COMPONENTS..............................................................................................................................................9
ACS DISCOVERY ......................................................................................................................................................10
USE OF SSL/TLS AND TCP.........................................................................................................................................10
USE OF HTTP..........................................................................................................................................................10
USE OF SOAP .........................................................................................................................................................11
TR-69 SPECIFIED RPCS .............................................................................................................................................12
FAULT HANDLING......................................................................................................................................................13
PROTOCOLS’ INTEROPERPROTOCOLS’ INTEROPERPROTOCOLS’ INTEROPERPROTOCOLS’ INTEROPERABILITYABILITYABILITYABILITY ................................................................................................................................................................................ 14141414
TRANSACTION SESSIONTRANSACTION SESSIONTRANSACTION SESSIONTRANSACTION SESSION ................................................................................................................................................................................................................ 15151515
RPCSRPCSRPCSRPCS ............................................................................................................................................................................................................................................................................ 16161616
INFORM..................................................................................................................................................................17
GETRPCMETHODS....................................................................................................................................................17
GETPARAMETERNAMES...............................................................................................................................................17
GETPARAMETERVALUES..............................................................................................................................................17
SETPARAMETERVALUES ..............................................................................................................................................17
GETPARAMETERATTRIBUTES ........................................................................................................................................17
SETPARAMETERATTRIBUTES ........................................................................................................................................17
ADDOBJECT ............................................................................................................................................................18
DELETEOBJECT ........................................................................................................................................................18
DOWNLOAD.............................................................................................................................................................18
TRANSFERCOMPLETE .................................................................................................................................................19
REQUESTDOWNLOAD.................................................................................................................................................19
FACTORYRESET ........................................................................................................................................................19
REBOOT .................................................................................................................................................................19
TRTRTRTR----069 RELEVANT TRS069 RELEVANT TRS069 RELEVANT TRS069 RELEVANT TRS ................................................................................................................................................................................................................ 20202020
REFERENCESREFERENCESREFERENCESREFERENCES .................................................................................................................................................................................................................................................... 22222222
APPENDIX: INFORM MESAPPENDIX: INFORM MESAPPENDIX: INFORM MESAPPENDIX: INFORM MESSAGE ETHEREAL PCAPSAGE ETHEREAL PCAPSAGE ETHEREAL PCAPSAGE ETHEREAL PCAP .................................................................................................................................... 23232323
Summary
General Description
The CPE WAN Management Protocol defines a mechanism that encompasses secure
auto-configuration of a CPE, and also incorporates other CPE management functions into a
common framework.
Terminology
In this seciont, it will list all abbreviations used in this document.
B-NT : Broadband Network Termination
CPE : Customer Primise Equipment
A DSL B-NT is one of form of broadband CPE. This could be ADSL modem
DSLAM : Digital Subscriber Line Access Multiplexer
The DSLAM at the access provider is the equipment that really allows DSL to happen. A
DSLAM takes connections from many customers and aggregates them onto a single,
high-capacity connection to the Internet. It may provide additional functions including
routing or dynamic IP address assignment for the customers.
BRAS : Broadband Remote Access Server
This is the connection point to the network(Internet, WAN) and application service
providers(ISP, Coporate Network…etc)
ACS : Auto-Configuration Server
This is a component in the broadband network responsible for auto-configuration of the CPE
for advanced services.
IGD : Internet Gateway Device
A CPE device that is either a B-NT or a broadband router.
RPC : Remote Procedure Call
Parameter
A name-value pari representing a manageable CPE parameter made accessible to an ACS for
reading and/or writing.
Session
A contiguous sequence of transactions(one request and one response) between a CPE
and an ACS.
Voucher
A digitally signed data structure that instructs a particular CPE to enable or disable Options,
and characteristics that determine under what conditions the Options persist.
OUI : Organizationally Unique Identifier
An OUI is a 24-bit globally unique assigned number referenced by various standards. For
example, the OUI is used in the family of 802 LAN standards: Ethernet, Token Ring, etc.
The OUI is usually concatenated with another 24 bits that are assigned by that Organization
in order to make a 48-bit number that is unique to a particular piece of hardware, to make it
possible to uniquely address that hardware. For example, the Ethernet MAC Address is such a
48-bit number, unique to one particular Ethernet interface. The OUI is usually concatenated
with 24 or 40 bits to form an EUI-48 or an EUI-64.
The other names for OUI is : MAC Address, Vendor Address, Vendor ID, NIC Address,
Ethernet Address and others.
Functional Components
The CPE WAN Management Protocol is intended to support a variety of functionalities to manage a
collection of CPEs lie in LAN through WAN. It provides the following main capability :
Auto-Configuration and Dynamic Service Provisioning
The protocol allows an ACS to provision a CPE or collection of CPE based on a variety of
criteria. The provisioning mechanism includes specific provisioning parameters and a general
mechanism for adding vendor-specific provisioning capabilities as needed.
Software/Firmware Image Management
The CPE WAN Management Protocol provides tools to manage downloading of CPE
software/firmware image files. The protocol provides mechanisms for version
identification, file download initiation (ACS initiated downloads and optional CPE initiated
downloads), and notification of the ACS of the success or failure of a file download.
Status and Performance Monitoring
The protocol provides support for a CPE to make available information that the ACS may use to
monitor the CPE’s status and performance statistics. The protocol defines a common set of
such parameters, and provides a standard syntax for vendors to define additional
non-standard
Diagnostics
The protocol provides support for a CPE to make available information that the ACS may use to
diagnose connectivity or service issues. The protocol defines a common set of such
parameters and a general mechanism for adding vendor-specific diagnostic capabilities.
Positioning in the Auto-Configuration Architecture
Fig.1
Architectural Goals
The protocol is intended to provide flexible support for various business models for distributing
and managing CPE, including:
CPE provided and managed by the network provider.
CPE purchased in retail with pre-registration to associate the specific CPE with a service
provider and customer account (a mobile-phone like model) .
CPE purchased in retail with post-installation user registration with a service provider.
The protocol is intended to provide flexibility in the connectivity model. The protocol is intended
to provide the following:
Allow both CPE and ACS initiated connection establishment, avoiding the need for a
persistent connection to be maintained between each CPE and an ACS.
The functional interactions between the ACS and CPE should be independent of which end
initiated the establishment of the connection. In particular, even where ACS initiated
connectivity is not supported, all ACS initiated transactions should be able to take place
over a connection initiated by the CPE.
Allow one or more ACS servers to serve a population of CPE, which may be associated with
one or more service providers.
Optimize the use of connections that are established to minimize connection multiple
bi-directional transactions to occur over a single connection.
The protocol is intended to support discovery and association of ACS and CPE :
TR-104 (old WT-104)
(may haveDHCP)
Internet, ISP network,
Frame Relay…
(TR-069)
LAN
WAN
Provide mechanisms for a CPE to discover the appropriate ACS for a given service
provider.
Provide mechanisms to allow an ACS to securely identify a CPE (using OUI) and
associate it with a user/customer. Processes to support such association should support
models that incorporate user interaction as well as those that are fully automatic.
The protocol model to allow an ACS access to control and monitor various parameters
associated with a CPE. The mechanisms provided to access these parameters is designed with the
following premises :
Different CPE may have differing capability levels, implementing different subsets of optional
functionality. As a result, an ACS must be able to discover the capabilities of a
particular CPE.
An ACS must be able to control and monitor the current configuration of a CPE.
Other control entities besides an ACS may be able to control some parameters of a CPE’s
configuration (e.g., via LAN-side auto-configuration). As a result, the protocol must allow an
ACS to account for external changes to a CPE’s configuration. The ACS should also be able to
control which configuration parameters can be controlled via means other than by the ACS.
The protocol should allow vendor-specific parameters to be defined and accessed.
Security
The protocol is designed to provide a high degree of security. The security model is also designed to
be scalable. It is intended to allow basic security to accommodate less robust CPE
implementations, while allowing greater security for those that can support more advanced security
mechanisms.
Assumptions
Some assumptions made in defining the CPE WAN Management Protocol are listed below :
In the case of a B-NT, prior to use of the CPE WAN Management Protocol, a connection has
been established to a WAN from which an ACS is accessible.
All CPE regardless of type (bridge1, router, or other) obtain an IP address in order to
communicate with an ACS.
A CPE can interact with a single ACS at a time. At any time, a CPE is aware of exactly
one ACS with which it can connect. An ACS can hand off a CPE to another ACS only by
explicitly altering the ACS contact and authentication information.
Use of Protocols
Protocol Components
CPE/ACS Management Application
RPC Methods
SOAP
HTTP
SSL/TLS
TCP/IP
Fig.2
Protocol Layer Description
CPE/ACS Application The application uses the CPE WAN Management Protocol on the CPE and ACS, respectively. The
application is locally defined and not specified as part of the CPE WAN Management Protocol
RPC Methods The specific RPC methods that are defined by the CPE WAN Management Protocol (TR-69)
SOAP A standard XML-based syntax used here to encode remote procedure calls. Specifically SOAP 1.1 [4]
HTTP HTTP 1.1 [2]
SSL/TLS The standard Internet transport layer security protocols. Specifically, either SSL 3.0 [4] (Secure Socket
Layer), or TLS 1.0 [5] (Transport Layer Security). Use of SSL/TLS is RECOMMENDED but is not
required
TCP/IP Standard TCP/IP
Fig.3
ACS Discovery
The CPE may be configured locally with the URL of the ACS.
As part of the IP layer auto-configuration, a DHCP server on the access network may be
configured to include the ACS URL as a DHCP option.
The CPE may have a default ACS URL that it may use if no other URL is provided to it.
The CPE would use DNS(DomainName Server) to resolve the IP address of the ACS from
the host name component of the URL.
Use of SSL/TLS and TCP
The use of SSL/TLS to transport the CPE WAN Management Protocol is RECOMMENDED
If SSL/TLS is supported, support for encryption algorithms with key lengths greater than or
equal to 128 bits should be supported.
A CPE must be able to initiate outgoing connections to the ACS.
An ACS must be able to accept CPE-initiated connections.
If SSL/TLS is used, the CPE must authenticate the ACS using the ACS-provided
certificate.
If SSL/TLS is used, the ACS MAY accept a validated CPE-provided certificate to authenticate
the CPE, but the ACS MUST allow the SSL/TLS connection to be established if the CPE does
not provide a certificate.
Use of HTTP
A SOAP request from an ACS to a CPE is sent over an HTTP response, while the CPE’s
SOAP response to an ACS request is sent over a subsequent HTTP post.
Each HTTP post or response may contain more than one SOAP envelope (within the
negotiated limits). Each envelope may contain a SOAP request or response, independent from
any other envelope.
Authentication
If the CPE is not authenticated using SSL/TLS, the ACS must authenticate the CPE using HTTP.
If SSL/TLS is being used for encryption, the ACS may use either basic or digest
authentication[3]. If SSL/TLS is not being used, then the ACS must use digest
authentication.
The ACS may issue the authentication once as part of the first HTTP transaction, and assume
the authentication to hold for the duration of the TCP connection.
If any form of HTTP authentication is used to authenticate the CPE, the CPE should use a
username / userid that is globally unique among all CPE manufacturers. Specifically it should be
a multi-part string comprising a manufacturer identifier and a serial number unique within that
manufacturer.
The recommended format for this string is:
OUI-SERIAL
where OUI is a six hexadecimal-digit value using all upper-case letters and including any leading
zeros. The OUI value MUST be a valid OUI as defined in [5]. SERIAL is a string that uniquely
identifies the CPE from the particular manufacturer.
If the manufacturer has multiple CPE products with overlapping serial number ranges, the SERIAL
string must include additional distinguishing characters to ensure that the entire string is
unique.
Example: “00D09E-0123456789” The password used in either form of HTTP authentication
should be a unique value for each CPE. That is, multiple CPE should not share the same
password. This password is a shared secret, and thus must be known by both CPE and ACS.
Both CPE and ACS should take appropriate steps to prevent unauthorized access to the password,
or list of passwords in the case of an ACS.
Use of SOAP
The CPE WAN Management Protocol defines SOAP 1.1 as the encoding syntax to transport the
RPC method calls and responses.
The encoding must use the standard SOAP 1.1 envelope and serialization namespaces :
Envelope namespace identifier “http://schemas.xmlsoap.org/soap/envelope/”
Serialization namespace identifier “http://schemas.xmlsoap.org/soap/encoding/”
All elements and attributes defined as part of this version of the CPE WAN Management Protocol
are associated with the following namespace identifier:
“urn:dslforum-org:cwmp-1-0”
TR-69 specified RPCs
Fig.4
Method name CPE requirement Server requirement
CPE methods Responding Calling
GetRPCMethods Required Optional
SetParameterValues Required Required
GetParameterValues Required Required
GetParameterNames Required Required
SetParameterAttributes Required Optional
GetParameterAttributes Required Optional
AddObject Required Optional
DeleteObject Required Optional
Reboot Required Optional
Download Required Required
Upload Optional Optional
FactoryReset Optional Optional
GetQueuedTransfers Optional Optional
ScheduleInform Optional Optional
SetVouchers Optional Optional
GetOptions Optional Optional
Server methods Calling Responding
GetRPCMethods Optional Required
Inform Required Required
TransferComplete Required Required
RequestDownload Optional Optional
Kicked Optional Optional
Fault Handling
Fig.5 lists the fault codes that can be returned by a CPE.
Fig.6 lists the fault codes that can be returned by a server.
Protocols’ Interoperability
Hardware
(Device /
Network)
Layer
Operating
System
Layer
Application
Layer
Flash
Network
(TCP/IP)
socket (TLS/SSL) App-HW IF
WAN
HTTP
( Basic and Digest
Access Athentication )
SOAP RPCs
TR-69
Message Processor
1)Msg Processor State
Controlling
2) RPCs recognizing &
RPC services dispaching)
RPC
services
Decoding RPC
message
Read / Write
Configuration
MD5 Digesting
SSL
Encrypting /
Decrypting
send / recv bytes
Executing
results
Encoding RPC
Response / Faults
Transaction Session
Since the CPE is driving the HTTP connection to the ACS, only the CPE is responsible for
connection initiation and teardown.
All transaction sessions must begin with an Inform message from the CPE contained in the
initial HTTP post.
CPE is responsible for terminating the transaction session, while the ACS could just
consider the session terminated.
This specification does not say that there should be a persistent connection between the CPE
and the ACS.
Fig.7
Having
no
content
RPCs
The following are the RPPs specified in the TR-069 specification.
Method name CPE
requireme
nt
Server requirement
CPE methods Responding Calling
GetRPCMethods Required Optional
SetParameterValues Required Required
GetParameterValues Required Required
GetParameterNames Required Required
SetParameterAttributes Required Optional
GetParameterAttributes Required Optional
AddObject Required Optional
DeleteObject Required Optional
Reboot Required Optional
Download Required Required
Upload Optional Optional
FactoryReset Optional Optional
GetQueuedTransfers Optional Optional
ScheduleInform Optional Optional
SetVouchers Optional Optional
GetOptions Optional Optional
Server methods Calling Responding
GetRPCMethods Optional Required
Inform Required Required
TransferComplete Required Required
RequestDownload Optional Optional
Kicked Optional Optional
Inform
A CPE must call the Inform method to initiated a transaction sequence whenever a connection
to an ACS is established.
GetRPCMethods
This method may be used by a CPE or Server to discover the set of methods supported by the
Server or CPE it is in communication with. This list may include both standard methods (those
defined in this specification or a subsequent version) and vendor-specific methods. The
receiver of the response MUST ignore any unrecognized methods.
GetParameterNames
This method may be used by a Server to discover the Parameters accessible on a particular
CPE.
GetParameterValues
This method may be used by a Server to obtain the value of one or more CPE Parameters.
SetParameterValues
This method may be used by a Server to modify the value of one or more CPE Parameters.
On successful receipt of a SetParameterValues RPC, the CPE must apply the changes to
each of the specified Parameters immediately and atomically. The order of Parameters
listed in the ParameterList has no significance—the application of value changes to the CPE
must be independent from the order in which they are listed.
A successful response to this RPC should occur only after the new Parameter values
have been successfully applied. If the CPE requires a reboot before applying the
Parameter values, the CPE must reply before such a reboot, and thus before the
Parameter values have been applied. In this case, the reply must come only after all validation
of the request has been completed and the new values have been appropriately saved
such that they will definitely be applied immediately following the reboot.
GetParameterAttributes
This method may be used by a Server to read the attributes associated with one or more CPE
Parameter.
SetParameterAttributes
This method may be used by a Server to modify attributes associated with one or more CPE
Parameter.
AddObject
This method may be used by the Server to create a new instance of a multi-instance object —
a collection of Parameters and/or other objects for which multiple instances are
defined.
The method call takes as an argument the path name of the collection of objects for which a
new instance is to be created. For example :
Top.Group.Object
This path name does not include an instance number for the object to be created. That
instance number is assigned by the CPE and returned in the response. Once assigned
the instance number of an object cannot be changed and persists until the object is deleted
using the DeleteObject method.
After creation, Parameters or sub-objects within the object are refereced by the path name
appended with the instance number. For example, if the AddObject method returned an
instance number of 2, a Parameter within this instance may then be referred to by the path:
Top.Group.Object.2.Parameter
On creation of an object using this method, the Parameters contained within the object are
set to their default values and the associated attributes are set to the following :
Notification is set to zero (notification off)
AccessList includes all defined entities
After doing this operation, it should save the modified configuration into the flash.
DeleteObject
This method is used to remove a particular instance of an object. This method call takes
as an argument the path name of the object instance including the instance number. For
example:
Top.Group.Object.2.
If this method call is successful, the specified instance of this object is subsequently
unavailable for access and the CPE may discard the state previously associated with any
Parameter or sub-object contained within this instance.
When an object instance is deleted, the instance numbers associated with any other instances
of the same collection of objects remain unchanged. Thus, the instance numbers of object
instances in a collection might not be consecutive.
After doing this operation, it should save the modified configuration into the flash.
Download
This method may be used by the Server to cause the CPE to download a specified file from
the designated location.
TransferComplete
This method informs the server of the completion (either successful or unsuccessful) of a file
transfer initiated by an earlier Download or Upload method call.
This must be called only when the associated Download or Upload response indicated that
the transfer had not yet completed at that time (indicated by a non-zero value of the
Status argument in the response). In such cases, it may be called either later in the same
session in which the transfer was initiated or in any subsequent session.
When used, this method should be called only after the transfer has completed (or failed).
The criteria used by a CPE to determine when a transfer is considered complete are specific to
the implementation of the CPE.
RequestDownload
This method allows the CPE to request a file download from the Server. On reception of this
request, the Server may call the Download method to initiate the download.
FactoryReset
This method resets the CPE to its factory default state. This method should be used with
extreme caution.
Reboot
This method causes the CPE to reboot. The CPE MUST send the method response prior to
rebooting. It should be used with extreme caution.
This method is primarily intended for diagnostic purposes. This method is not intended for
use by an ACS to initiate a reboot after setting CPE parameters or initiating a
download.
If a CPE requires a reboot in those cases, it is responsible for initiating that reboot on its
own after the termination of the session.
Because some CPE may not require a reboot under these circumstances, an ACS should not call
this method in these cases, which would result in an unnecessary reboot.
TR-069 Relevant TRs
The followings are explanations for all TR-069 related TRs.
TR-069 : CPE WAN Management Protocol
Describes a bi-directional remote management protocol for CPE, intended for communication between CPE and
management entity known as an Auto-Configuration Server (ACS). It is intended to support a variety of
functionalities to manage CPE, including auto-configuration and dynamic service provisioning,
software/firmware image management, status and performance monitoring and diagnostics.
Amendment 1 includes interoperability-related clarifications and errata.
Amendment 2 includes extensions to enable multi-cast and autonomous file downloads, especially important for
many video environments.
TR-098 : Internet Gateway Device Data Model
Defines the Internet Gateway Device (IGD) data model for managing various types of broadband CPE, or
gateways, using TR-069. Includes functionality such as managing NAT, DHCP, WAN and LAN interfaces.
TR-104 : Provisioning Parameters for VoIP CPE
Defines the data model required for managing a VoIP-capable device (including terminal adapters and VoIP
endpoints) using TR-069.
TR-106 : Data Model Template for TR-069-enabled Devices
Includes both common management objects for TR-069 managed end devices and rules for combining modular
functionalities described in various specifications (e.g., how to combine TR-104 and TR-098 object for an ATA
embedded in a gateway).
WT-107 : TR-098 Issue 2
Contains additional management objects and parameters for the gateway data model.
TR-111 : Applying TR-069 to Remote Management of Home Networking Devices
Defines extensions to the TR-069 protocol and TR-098 IGD and TR-106 data models to enhance the ability of an
ACS to manage devices in customer premises. Describes both a mechanism to enable IGD and end device
association and the ability for an ACS to initiate a management session on a device behind a NAT gateway.
Note that the content originally specified in TR-111 has been incorporated into the Amendment 1 versions of
TR-069, TR-106, and TR-098. PD-128Interoperability Test Plan for TR-069 Plugfests Interoperability test plan
used at plugfests for TR-069-capable ACSes and CPE. Defines interoperability tests at for the underlying
protocols on which TR-069 is built, the TR-069 methods, as well as real-world application tests.
WT-131 : ACS Northbound Interface Requirements
Requirements for an ACS northbound API to backend OSS/BSS, support and policy systems.
TR-135 : Data Model for a TR-069-enabled STB
Defines the data model required for managing a set-top box (STB) using TR-069, including satellite, cable,
terrestrial and IPTV STBs—with or without PVR and other optional functionality.
TR-140 : Data Model for TR-069-enabled Network Attached Storage Device
Defines a TR-069 data model for provisioning and management of devices delivering content storage capabilities.
Storage-enabled devices could include NAS, media servers, or PVR-related storage.
WT-142 : Framework for TR-069-enabled PON Devices
Outlines a general framework for applying TR-069 to Optical Network Terminals (ONTs) in a fiber network.
WT-143 : Network Service Provider Initiated Throughput Performance Test
Defines a data model to enable throughput testing for TR-069-enabled CPE.
PD-154 : XML Data Model Definition
Defines XML schema for data models. Provides the architecture of expression of data model specifications in
XML as well as a CPE's overall management capabilities in XML.
PD-157TR-069 Data Model Common Objects
Contains additional common management objects and parameters for end devices.
PD-158 : TR-069 Data Model for Email and Browser Services
Defines a data model to enable management of device email and browser services.
References
1. DSL Forum, http://www.dslforum.org
2. RFC 2616, Hypertext Transfer Protocol—HTTP/1.1, http://www.ietf.org/rfc/rfc2616.txt
3. RFC 2617, HTTP Authentication: Basic and Digest Access Authentication,
http://www.ietf.org/rfc/rfc2617.txt
4. Simple Object Access Protocol (SOAP) 1.1, http://www.w3.org/TR/2000/NOTE-SOAP-20000508
5. Orginationally Unique Identifiers (OUIs), http://standards.ieee.org/faqs/OUI.html
6. The SSL Protocol, Version 3.0, http://www.netscape.com/eng/ssl3/draft302.txt
7. RFC 2246, The TLS Protocol, Version 1.0, http://www.ietf.org/rfc/rfc2246.txt
8. RFC 2132, DHCP Options and BOOTP Vendor Extensions, http://www.ietf.org/rfc/rfc2132.txt
9. Technical Report 037(TR-037) : Auto-Configuration for the Conncetion Between the DSL Broadband
Network termination(B-NT) and the Network using ATM, DSL Forum, March 2001.
10. Technical Report 069(TR-069) : CPE WAN Management Protocol, Jeff Bernstein, Tim Spets, May 2004.
23
Appendix: Inform message Ethereal PCAP
Captured on 2005-12-26
24
25
26

More Related Content

What's hot

Telecom self organizing network
Telecom self organizing networkTelecom self organizing network
Telecom self organizing networkPankaj Chomal
 
Huawei umts o&m planning and configuration
Huawei umts o&m planning and configurationHuawei umts o&m planning and configuration
Huawei umts o&m planning and configurationTerra Sacrifice
 
OpenKilda: Stream Processing Meets Openflow
OpenKilda: Stream Processing Meets OpenflowOpenKilda: Stream Processing Meets Openflow
OpenKilda: Stream Processing Meets OpenflowAPNIC
 
Cisco nexus 7009 overview
Cisco nexus 7009 overviewCisco nexus 7009 overview
Cisco nexus 7009 overviewHamza Al-Qudah
 
Implementing MPLS Services using Openflow
Implementing MPLS Services using OpenflowImplementing MPLS Services using Openflow
Implementing MPLS Services using OpenflowAPNIC
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routingWilfredzeng
 
mastering-kali-linux-for-advanced-penetration-testing-book-look2linux-com.pdf
mastering-kali-linux-for-advanced-penetration-testing-book-look2linux-com.pdfmastering-kali-linux-for-advanced-penetration-testing-book-look2linux-com.pdf
mastering-kali-linux-for-advanced-penetration-testing-book-look2linux-com.pdfManiacH1
 
MP BGP-EVPN 실전기술-1편(개념잡기)
MP BGP-EVPN 실전기술-1편(개념잡기)MP BGP-EVPN 실전기술-1편(개념잡기)
MP BGP-EVPN 실전기술-1편(개념잡기)JuHwan Lee
 
1-NSA Basical Precedure Introduction -trainning 5G RADIO FREQUENCY EMERSON E...
1-NSA Basical  Precedure Introduction -trainning 5G RADIO FREQUENCY EMERSON E...1-NSA Basical  Precedure Introduction -trainning 5G RADIO FREQUENCY EMERSON E...
1-NSA Basical Precedure Introduction -trainning 5G RADIO FREQUENCY EMERSON E...EMERSON EDUARDO RODRIGUES
 
công nghệ MIMO trong 4G-Lte
công nghệ MIMO trong 4G-Ltecông nghệ MIMO trong 4G-Lte
công nghệ MIMO trong 4G-LtePTIT HCM
 
Chuyển mạch nhãn đa giao thức mpls
Chuyển mạch nhãn đa giao thức mplsChuyển mạch nhãn đa giao thức mpls
Chuyển mạch nhãn đa giao thức mplssuccessnguyen86
 
ĐỀ TÀI :TÌM HIỂU MULTICAST VÀ ỨNG DỤNG MULTICAST TRONG IPTV
ĐỀ TÀI :TÌM HIỂU MULTICAST VÀ ỨNG DỤNG MULTICAST TRONG IPTV ĐỀ TÀI :TÌM HIỂU MULTICAST VÀ ỨNG DỤNG MULTICAST TRONG IPTV
ĐỀ TÀI :TÌM HIỂU MULTICAST VÀ ỨNG DỤNG MULTICAST TRONG IPTV nataliej4
 
VoLTE and ViLTE.pdf
VoLTE and ViLTE.pdfVoLTE and ViLTE.pdf
VoLTE and ViLTE.pdfAsitSwain5
 
Winhon Network Solution
Winhon Network SolutionWinhon Network Solution
Winhon Network SolutionJinzdm
 
Alphorm.com Formation Microsoft Azure : Azure Active Directory 2021
Alphorm.com Formation Microsoft Azure : Azure Active Directory 2021Alphorm.com Formation Microsoft Azure : Azure Active Directory 2021
Alphorm.com Formation Microsoft Azure : Azure Active Directory 2021Alphorm
 
Ue state transition-huawei-description
Ue state transition-huawei-descriptionUe state transition-huawei-description
Ue state transition-huawei-descriptionYibeltal Addis
 

What's hot (20)

Telecom self organizing network
Telecom self organizing networkTelecom self organizing network
Telecom self organizing network
 
ECI UTC Webinar MPLS-TP Value for Utilities-dec 2015
ECI UTC Webinar MPLS-TP Value for Utilities-dec 2015ECI UTC Webinar MPLS-TP Value for Utilities-dec 2015
ECI UTC Webinar MPLS-TP Value for Utilities-dec 2015
 
Huawei umts o&m planning and configuration
Huawei umts o&m planning and configurationHuawei umts o&m planning and configuration
Huawei umts o&m planning and configuration
 
OpenKilda: Stream Processing Meets Openflow
OpenKilda: Stream Processing Meets OpenflowOpenKilda: Stream Processing Meets Openflow
OpenKilda: Stream Processing Meets Openflow
 
Cisco nexus 7009 overview
Cisco nexus 7009 overviewCisco nexus 7009 overview
Cisco nexus 7009 overview
 
Implementing MPLS Services using Openflow
Implementing MPLS Services using OpenflowImplementing MPLS Services using Openflow
Implementing MPLS Services using Openflow
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routing
 
mastering-kali-linux-for-advanced-penetration-testing-book-look2linux-com.pdf
mastering-kali-linux-for-advanced-penetration-testing-book-look2linux-com.pdfmastering-kali-linux-for-advanced-penetration-testing-book-look2linux-com.pdf
mastering-kali-linux-for-advanced-penetration-testing-book-look2linux-com.pdf
 
NFV Tutorial
NFV TutorialNFV Tutorial
NFV Tutorial
 
MX960 Router
MX960 RouterMX960 Router
MX960 Router
 
MP BGP-EVPN 실전기술-1편(개념잡기)
MP BGP-EVPN 실전기술-1편(개념잡기)MP BGP-EVPN 실전기술-1편(개념잡기)
MP BGP-EVPN 실전기술-1편(개념잡기)
 
1-NSA Basical Precedure Introduction -trainning 5G RADIO FREQUENCY EMERSON E...
1-NSA Basical  Precedure Introduction -trainning 5G RADIO FREQUENCY EMERSON E...1-NSA Basical  Precedure Introduction -trainning 5G RADIO FREQUENCY EMERSON E...
1-NSA Basical Precedure Introduction -trainning 5G RADIO FREQUENCY EMERSON E...
 
công nghệ MIMO trong 4G-Lte
công nghệ MIMO trong 4G-Ltecông nghệ MIMO trong 4G-Lte
công nghệ MIMO trong 4G-Lte
 
Chuyển mạch nhãn đa giao thức mpls
Chuyển mạch nhãn đa giao thức mplsChuyển mạch nhãn đa giao thức mpls
Chuyển mạch nhãn đa giao thức mpls
 
ĐỀ TÀI :TÌM HIỂU MULTICAST VÀ ỨNG DỤNG MULTICAST TRONG IPTV
ĐỀ TÀI :TÌM HIỂU MULTICAST VÀ ỨNG DỤNG MULTICAST TRONG IPTV ĐỀ TÀI :TÌM HIỂU MULTICAST VÀ ỨNG DỤNG MULTICAST TRONG IPTV
ĐỀ TÀI :TÌM HIỂU MULTICAST VÀ ỨNG DỤNG MULTICAST TRONG IPTV
 
VoLTE and ViLTE.pdf
VoLTE and ViLTE.pdfVoLTE and ViLTE.pdf
VoLTE and ViLTE.pdf
 
Winhon Network Solution
Winhon Network SolutionWinhon Network Solution
Winhon Network Solution
 
Alphorm.com Formation Microsoft Azure : Azure Active Directory 2021
Alphorm.com Formation Microsoft Azure : Azure Active Directory 2021Alphorm.com Formation Microsoft Azure : Azure Active Directory 2021
Alphorm.com Formation Microsoft Azure : Azure Active Directory 2021
 
Inter-AS MPLS VPN Deployment
Inter-AS MPLS VPN DeploymentInter-AS MPLS VPN Deployment
Inter-AS MPLS VPN Deployment
 
Ue state transition-huawei-description
Ue state transition-huawei-descriptionUe state transition-huawei-description
Ue state transition-huawei-description
 

Viewers also liked

Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2Axiros
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069William Lee
 
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies
 
Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069William Lee
 
Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114Clay Melugin
 
4G LTE Device Management for Accelerated Wireless Broadband
 4G LTE Device Management for Accelerated Wireless Broadband 4G LTE Device Management for Accelerated Wireless Broadband
4G LTE Device Management for Accelerated Wireless BroadbandFriendly Technologies
 
IEEE 802.11ac -- BRIEF INTRO
IEEE 802.11ac  -- BRIEF INTROIEEE 802.11ac  -- BRIEF INTRO
IEEE 802.11ac -- BRIEF INTROPrashantkumar R
 
Introduction To Cellular Networks
Introduction To Cellular NetworksIntroduction To Cellular Networks
Introduction To Cellular NetworksYoram Orzach
 
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must KnowVala Afshar
 
Docker, Linux Containers (LXC), and security
Docker, Linux Containers (LXC), and securityDocker, Linux Containers (LXC), and security
Docker, Linux Containers (LXC), and securityJérôme Petazzoni
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingu065932
 
SDH/SONET alarms & performance monitoring
SDH/SONET alarms & performance monitoringSDH/SONET alarms & performance monitoring
SDH/SONET alarms & performance monitoringMapYourTech
 
Telecom Italia Experiences of OSGi Application in Home Networking Context - N...
Telecom Italia Experiences of OSGi Application in Home Networking Context - N...Telecom Italia Experiences of OSGi Application in Home Networking Context - N...
Telecom Italia Experiences of OSGi Application in Home Networking Context - N...mfrancis
 
TR-069 and the road to the smart home
TR-069 and the road to the smart homeTR-069 and the road to the smart home
TR-069 and the road to the smart homeAxiros
 
Using GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune DesktopsUsing GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune DesktopsUnidesk Corporation
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceFatih Ozavci
 
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal44CON
 

Viewers also liked (20)

Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 2
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069
 
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
 
Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069
 
Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114
 
4G LTE Device Management for Accelerated Wireless Broadband
 4G LTE Device Management for Accelerated Wireless Broadband 4G LTE Device Management for Accelerated Wireless Broadband
4G LTE Device Management for Accelerated Wireless Broadband
 
IEEE 802.11ac -- BRIEF INTRO
IEEE 802.11ac  -- BRIEF INTROIEEE 802.11ac  -- BRIEF INTRO
IEEE 802.11ac -- BRIEF INTRO
 
Introduction To Cellular Networks
Introduction To Cellular NetworksIntroduction To Cellular Networks
Introduction To Cellular Networks
 
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
50 Incredible Wi-Fi Tech Statistics That Businesses Must Know
 
Docker, Linux Containers (LXC), and security
Docker, Linux Containers (LXC), and securityDocker, Linux Containers (LXC), and security
Docker, Linux Containers (LXC), and security
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
SDH/SONET alarms & performance monitoring
SDH/SONET alarms & performance monitoringSDH/SONET alarms & performance monitoring
SDH/SONET alarms & performance monitoring
 
Deep C
Deep CDeep C
Deep C
 
Telecom Italia Experiences of OSGi Application in Home Networking Context - N...
Telecom Italia Experiences of OSGi Application in Home Networking Context - N...Telecom Italia Experiences of OSGi Application in Home Networking Context - N...
Telecom Italia Experiences of OSGi Application in Home Networking Context - N...
 
TR-069 and the road to the smart home
TR-069 and the road to the smart homeTR-069 and the road to the smart home
TR-069 and the road to the smart home
 
TR-069_Amendment-5
TR-069_Amendment-5TR-069_Amendment-5
TR-069_Amendment-5
 
Tr 069
Tr 069Tr 069
Tr 069
 
Using GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune DesktopsUsing GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune Desktops
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
 
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
 

Similar to More Details about TR-069 (CPE WAN Management Protocol)

Streaming Media Server Setup Manual
Streaming Media Server Setup ManualStreaming Media Server Setup Manual
Streaming Media Server Setup ManualWilliam Lee
 
GE_FANUC_Wiring_Diagram circuit GE_FANUC_Wiring_Diagram circuit
GE_FANUC_Wiring_Diagram circuit   GE_FANUC_Wiring_Diagram circuitGE_FANUC_Wiring_Diagram circuit   GE_FANUC_Wiring_Diagram circuit
GE_FANUC_Wiring_Diagram circuit GE_FANUC_Wiring_Diagram circuitssuser73d8ba
 
4 g americas developing integrating high performance het-net october 2012
4 g americas  developing integrating high performance het-net october 20124 g americas  developing integrating high performance het-net october 2012
4 g americas developing integrating high performance het-net october 2012Zoran Kehler
 
Dc 3 operatorsmanualadvancedv2.0
Dc 3 operatorsmanualadvancedv2.0Dc 3 operatorsmanualadvancedv2.0
Dc 3 operatorsmanualadvancedv2.0IngenieriaClinica
 
Saptableref[1]
Saptableref[1]Saptableref[1]
Saptableref[1]mpeepms
 
Cub cadet 8404 tractor service repair manual
Cub cadet 8404 tractor service repair manualCub cadet 8404 tractor service repair manual
Cub cadet 8404 tractor service repair manualfusjejfskekem
 
Cub cadet 8404 tractor service repair manual
Cub cadet 8404 tractor service repair manualCub cadet 8404 tractor service repair manual
Cub cadet 8404 tractor service repair manualfiskefjskemem
 
Cub cadet 8404 tractor service repair manual
Cub cadet 8404 tractor service repair manualCub cadet 8404 tractor service repair manual
Cub cadet 8404 tractor service repair manualufjjdjkksekmd
 
Cub cadet 8354 tractor service repair manual
Cub cadet 8354 tractor service repair manualCub cadet 8354 tractor service repair manual
Cub cadet 8354 tractor service repair manualfhsejkdkmen
 
Cub cadet 8354 tractor service repair manual
Cub cadet 8354 tractor service repair manualCub cadet 8354 tractor service repair manual
Cub cadet 8354 tractor service repair manualfusjejfskekem
 
Cub cadet 8404 tractor service repair manual
Cub cadet 8404 tractor service repair manualCub cadet 8404 tractor service repair manual
Cub cadet 8404 tractor service repair manualfhsejkdkmen
 
Cub cadet 8354 tractor service repair manual
Cub cadet 8354 tractor service repair manualCub cadet 8354 tractor service repair manual
Cub cadet 8354 tractor service repair manualufjjdjkksekmd
 
Cub cadet 8354 tractor service repair manual
Cub cadet 8354 tractor service repair manualCub cadet 8354 tractor service repair manual
Cub cadet 8354 tractor service repair manualfiskefjskemem
 
Pandora FMS: IIS Enterprise Plugin
Pandora FMS: IIS Enterprise PluginPandora FMS: IIS Enterprise Plugin
Pandora FMS: IIS Enterprise PluginPandora FMS
 
Pandora FMS: SQL Enterprise PIugin
Pandora FMS: SQL Enterprise PIuginPandora FMS: SQL Enterprise PIugin
Pandora FMS: SQL Enterprise PIuginPandora FMS
 

Similar to More Details about TR-069 (CPE WAN Management Protocol) (20)

Streaming Media Server Setup Manual
Streaming Media Server Setup ManualStreaming Media Server Setup Manual
Streaming Media Server Setup Manual
 
Httpclient tutorial
Httpclient tutorialHttpclient tutorial
Httpclient tutorial
 
GE_FANUC_Wiring_Diagram circuit GE_FANUC_Wiring_Diagram circuit
GE_FANUC_Wiring_Diagram circuit   GE_FANUC_Wiring_Diagram circuitGE_FANUC_Wiring_Diagram circuit   GE_FANUC_Wiring_Diagram circuit
GE_FANUC_Wiring_Diagram circuit GE_FANUC_Wiring_Diagram circuit
 
4 g americas developing integrating high performance het-net october 2012
4 g americas  developing integrating high performance het-net october 20124 g americas  developing integrating high performance het-net october 2012
4 g americas developing integrating high performance het-net october 2012
 
Icp
IcpIcp
Icp
 
Dc 3 operatorsmanualadvancedv2.0
Dc 3 operatorsmanualadvancedv2.0Dc 3 operatorsmanualadvancedv2.0
Dc 3 operatorsmanualadvancedv2.0
 
Saptableref[1]
Saptableref[1]Saptableref[1]
Saptableref[1]
 
2015R2_CPQ_WN-Rev1
2015R2_CPQ_WN-Rev12015R2_CPQ_WN-Rev1
2015R2_CPQ_WN-Rev1
 
Xl2t
Xl2tXl2t
Xl2t
 
Car hacking
Car hackingCar hacking
Car hacking
 
Cub cadet 8404 tractor service repair manual
Cub cadet 8404 tractor service repair manualCub cadet 8404 tractor service repair manual
Cub cadet 8404 tractor service repair manual
 
Cub cadet 8404 tractor service repair manual
Cub cadet 8404 tractor service repair manualCub cadet 8404 tractor service repair manual
Cub cadet 8404 tractor service repair manual
 
Cub cadet 8404 tractor service repair manual
Cub cadet 8404 tractor service repair manualCub cadet 8404 tractor service repair manual
Cub cadet 8404 tractor service repair manual
 
Cub cadet 8354 tractor service repair manual
Cub cadet 8354 tractor service repair manualCub cadet 8354 tractor service repair manual
Cub cadet 8354 tractor service repair manual
 
Cub cadet 8354 tractor service repair manual
Cub cadet 8354 tractor service repair manualCub cadet 8354 tractor service repair manual
Cub cadet 8354 tractor service repair manual
 
Cub cadet 8404 tractor service repair manual
Cub cadet 8404 tractor service repair manualCub cadet 8404 tractor service repair manual
Cub cadet 8404 tractor service repair manual
 
Cub cadet 8354 tractor service repair manual
Cub cadet 8354 tractor service repair manualCub cadet 8354 tractor service repair manual
Cub cadet 8354 tractor service repair manual
 
Cub cadet 8354 tractor service repair manual
Cub cadet 8354 tractor service repair manualCub cadet 8354 tractor service repair manual
Cub cadet 8354 tractor service repair manual
 
Pandora FMS: IIS Enterprise Plugin
Pandora FMS: IIS Enterprise PluginPandora FMS: IIS Enterprise Plugin
Pandora FMS: IIS Enterprise Plugin
 
Pandora FMS: SQL Enterprise PIugin
Pandora FMS: SQL Enterprise PIuginPandora FMS: SQL Enterprise PIugin
Pandora FMS: SQL Enterprise PIugin
 

More from William Lee

Usage Note of Apache Thrift for C++ Java PHP Languages
Usage Note of Apache Thrift for C++ Java PHP LanguagesUsage Note of Apache Thrift for C++ Java PHP Languages
Usage Note of Apache Thrift for C++ Java PHP LanguagesWilliam Lee
 
Usage Note of Qt ODBC Database Access on Linux
Usage Note of Qt ODBC Database Access on LinuxUsage Note of Qt ODBC Database Access on Linux
Usage Note of Qt ODBC Database Access on LinuxWilliam Lee
 
Usage Note of SWIG for PHP
Usage Note of SWIG for PHPUsage Note of SWIG for PHP
Usage Note of SWIG for PHPWilliam Lee
 
Upgrade GCC & Install Qt 5.4 on CentOS 6.5
Upgrade GCC & Install Qt 5.4 on CentOS 6.5 Upgrade GCC & Install Qt 5.4 on CentOS 6.5
Upgrade GCC & Install Qt 5.4 on CentOS 6.5 William Lee
 
Usage Notes of The Bro 2.2 / 2.3
Usage Notes of The Bro 2.2 / 2.3Usage Notes of The Bro 2.2 / 2.3
Usage Notes of The Bro 2.2 / 2.3William Lee
 
Viewing Android Source Files in Eclipse (Chinese)
Viewing Android Source Files in Eclipse  (Chinese)Viewing Android Source Files in Eclipse  (Chinese)
Viewing Android Source Files in Eclipse (Chinese)William Lee
 
Usage Note of Microsoft Dependency Walker
Usage Note of Microsoft Dependency WalkerUsage Note of Microsoft Dependency Walker
Usage Note of Microsoft Dependency WalkerWilliam Lee
 
Usage Note of PlayCap
Usage Note of PlayCapUsage Note of PlayCap
Usage Note of PlayCapWilliam Lee
 
Qt4 App - Sliding Window
Qt4 App - Sliding WindowQt4 App - Sliding Window
Qt4 App - Sliding WindowWilliam Lee
 
GTK+ 2.0 App - Desktop App Chooser
GTK+ 2.0 App - Desktop App ChooserGTK+ 2.0 App - Desktop App Chooser
GTK+ 2.0 App - Desktop App ChooserWilliam Lee
 
GTK+ 2.0 App - Icon Chooser
GTK+ 2.0 App - Icon ChooserGTK+ 2.0 App - Icon Chooser
GTK+ 2.0 App - Icon ChooserWilliam Lee
 
Note of CGI and ASP
Note of CGI and ASPNote of CGI and ASP
Note of CGI and ASPWilliam Lee
 
Moblin2 - Window Manager(Mutter) Plugin
Moblin2 - Window Manager(Mutter) PluginMoblin2 - Window Manager(Mutter) Plugin
Moblin2 - Window Manager(Mutter) PluginWilliam Lee
 
Asterisk (IP-PBX) CDR Log Rotation
Asterisk (IP-PBX) CDR Log RotationAsterisk (IP-PBX) CDR Log Rotation
Asterisk (IP-PBX) CDR Log RotationWilliam Lee
 
L.A.M.P Installation Note --- CentOS 6.5
L.A.M.P Installation Note --- CentOS 6.5L.A.M.P Installation Note --- CentOS 6.5
L.A.M.P Installation Note --- CentOS 6.5William Lee
 
C Program Runs on Wrong Target Platform(CPU Architecture)
C Program Runs on Wrong Target Platform(CPU Architecture)C Program Runs on Wrong Target Platform(CPU Architecture)
C Program Runs on Wrong Target Platform(CPU Architecture)William Lee
 
Internationalization(i18n) of Web Page
Internationalization(i18n) of Web PageInternationalization(i18n) of Web Page
Internationalization(i18n) of Web PageWilliam Lee
 
Notes for SQLite3 Usage
Notes for SQLite3 UsageNotes for SQLite3 Usage
Notes for SQLite3 UsageWilliam Lee
 
Cygwin Install How-To (Chinese)
Cygwin Install How-To (Chinese)Cygwin Install How-To (Chinese)
Cygwin Install How-To (Chinese)William Lee
 

More from William Lee (20)

Usage Note of Apache Thrift for C++ Java PHP Languages
Usage Note of Apache Thrift for C++ Java PHP LanguagesUsage Note of Apache Thrift for C++ Java PHP Languages
Usage Note of Apache Thrift for C++ Java PHP Languages
 
Usage Note of Qt ODBC Database Access on Linux
Usage Note of Qt ODBC Database Access on LinuxUsage Note of Qt ODBC Database Access on Linux
Usage Note of Qt ODBC Database Access on Linux
 
Usage Note of SWIG for PHP
Usage Note of SWIG for PHPUsage Note of SWIG for PHP
Usage Note of SWIG for PHP
 
Upgrade GCC & Install Qt 5.4 on CentOS 6.5
Upgrade GCC & Install Qt 5.4 on CentOS 6.5 Upgrade GCC & Install Qt 5.4 on CentOS 6.5
Upgrade GCC & Install Qt 5.4 on CentOS 6.5
 
Usage Notes of The Bro 2.2 / 2.3
Usage Notes of The Bro 2.2 / 2.3Usage Notes of The Bro 2.2 / 2.3
Usage Notes of The Bro 2.2 / 2.3
 
Viewing Android Source Files in Eclipse (Chinese)
Viewing Android Source Files in Eclipse  (Chinese)Viewing Android Source Files in Eclipse  (Chinese)
Viewing Android Source Files in Eclipse (Chinese)
 
Usage Note of Microsoft Dependency Walker
Usage Note of Microsoft Dependency WalkerUsage Note of Microsoft Dependency Walker
Usage Note of Microsoft Dependency Walker
 
Usage Note of PlayCap
Usage Note of PlayCapUsage Note of PlayCap
Usage Note of PlayCap
 
Qt4 App - Sliding Window
Qt4 App - Sliding WindowQt4 App - Sliding Window
Qt4 App - Sliding Window
 
GTK+ 2.0 App - Desktop App Chooser
GTK+ 2.0 App - Desktop App ChooserGTK+ 2.0 App - Desktop App Chooser
GTK+ 2.0 App - Desktop App Chooser
 
GTK+ 2.0 App - Icon Chooser
GTK+ 2.0 App - Icon ChooserGTK+ 2.0 App - Icon Chooser
GTK+ 2.0 App - Icon Chooser
 
Note of CGI and ASP
Note of CGI and ASPNote of CGI and ASP
Note of CGI and ASP
 
Moblin2 - Window Manager(Mutter) Plugin
Moblin2 - Window Manager(Mutter) PluginMoblin2 - Window Manager(Mutter) Plugin
Moblin2 - Window Manager(Mutter) Plugin
 
MGCP Overview
MGCP OverviewMGCP Overview
MGCP Overview
 
Asterisk (IP-PBX) CDR Log Rotation
Asterisk (IP-PBX) CDR Log RotationAsterisk (IP-PBX) CDR Log Rotation
Asterisk (IP-PBX) CDR Log Rotation
 
L.A.M.P Installation Note --- CentOS 6.5
L.A.M.P Installation Note --- CentOS 6.5L.A.M.P Installation Note --- CentOS 6.5
L.A.M.P Installation Note --- CentOS 6.5
 
C Program Runs on Wrong Target Platform(CPU Architecture)
C Program Runs on Wrong Target Platform(CPU Architecture)C Program Runs on Wrong Target Platform(CPU Architecture)
C Program Runs on Wrong Target Platform(CPU Architecture)
 
Internationalization(i18n) of Web Page
Internationalization(i18n) of Web PageInternationalization(i18n) of Web Page
Internationalization(i18n) of Web Page
 
Notes for SQLite3 Usage
Notes for SQLite3 UsageNotes for SQLite3 Usage
Notes for SQLite3 Usage
 
Cygwin Install How-To (Chinese)
Cygwin Install How-To (Chinese)Cygwin Install How-To (Chinese)
Cygwin Install How-To (Chinese)
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

More Details about TR-069 (CPE WAN Management Protocol)

  • 1. More Details about TR-069 CPE WAN Management Protocol William.L wiliwe@gmail.com 2005-11-28
  • 2. Index SUMMARYSUMMARYSUMMARYSUMMARY .................................................................................................................................................................................................................................................................... 3333 GENERAL DESCRIPTION................................................................................................................................................3 TERMINOLOGYTERMINOLOGYTERMINOLOGYTERMINOLOGY .................................................................................................................................................................................................................................................... 4444 B-NT : BROADBAND NETWORK TERMINATION....................................................................................................................4 CPE : CUSTOMER PRIMISE EQUIPMENT ............................................................................................................................4 DSLAM : DIGITAL SUBSCRIBER LINE ACCESS MULTIPLEXER...................................................................................................4 BRAS : BROADBAND REMOTE ACCESS SERVER...................................................................................................................4 ACS : AUTO-CONFIGURATION SERVER .............................................................................................................................4 IGD : INTERNET GATEWAY DEVICE .................................................................................................................................4 RPC : REMOTE PROCEDURE CALL ...................................................................................................................................4 PARAMETER...............................................................................................................................................................4 SESSION...................................................................................................................................................................4 VOUCHER .................................................................................................................................................................5 OUI : ORGANIZATIONALLY UNIQUE IDENTIFIER..................................................................................................................5 FUNCTIONAL COMPONENTFUNCTIONAL COMPONENTFUNCTIONAL COMPONENTFUNCTIONAL COMPONENTSSSS ............................................................................................................................................................................................................ 6666 AUTO-CONFIGURATION AND DYNAMIC SERVICE PROVISIONING...............................................................................................6 SOFTWARE/FIRMWARE IMAGE MANAGEMENT .....................................................................................................................6 STATUS AND PERFORMANCE MONITORING .........................................................................................................................6 DIAGNOSTICS ............................................................................................................................................................6 POSITIONING IN THE AUTO-CONFIGURATION ARCHITECTURE .................................................................................................7 ASSUMPTIONS............................................................................................................................................................8 USE OF PROTOCOLSUSE OF PROTOCOLSUSE OF PROTOCOLSUSE OF PROTOCOLS ................................................................................................................................................................................................................................ 9999 PROTOCOL COMPONENTS..............................................................................................................................................9 ACS DISCOVERY ......................................................................................................................................................10 USE OF SSL/TLS AND TCP.........................................................................................................................................10 USE OF HTTP..........................................................................................................................................................10 USE OF SOAP .........................................................................................................................................................11 TR-69 SPECIFIED RPCS .............................................................................................................................................12 FAULT HANDLING......................................................................................................................................................13 PROTOCOLS’ INTEROPERPROTOCOLS’ INTEROPERPROTOCOLS’ INTEROPERPROTOCOLS’ INTEROPERABILITYABILITYABILITYABILITY ................................................................................................................................................................................ 14141414 TRANSACTION SESSIONTRANSACTION SESSIONTRANSACTION SESSIONTRANSACTION SESSION ................................................................................................................................................................................................................ 15151515 RPCSRPCSRPCSRPCS ............................................................................................................................................................................................................................................................................ 16161616 INFORM..................................................................................................................................................................17 GETRPCMETHODS....................................................................................................................................................17 GETPARAMETERNAMES...............................................................................................................................................17 GETPARAMETERVALUES..............................................................................................................................................17 SETPARAMETERVALUES ..............................................................................................................................................17 GETPARAMETERATTRIBUTES ........................................................................................................................................17 SETPARAMETERATTRIBUTES ........................................................................................................................................17 ADDOBJECT ............................................................................................................................................................18 DELETEOBJECT ........................................................................................................................................................18 DOWNLOAD.............................................................................................................................................................18 TRANSFERCOMPLETE .................................................................................................................................................19 REQUESTDOWNLOAD.................................................................................................................................................19 FACTORYRESET ........................................................................................................................................................19 REBOOT .................................................................................................................................................................19 TRTRTRTR----069 RELEVANT TRS069 RELEVANT TRS069 RELEVANT TRS069 RELEVANT TRS ................................................................................................................................................................................................................ 20202020 REFERENCESREFERENCESREFERENCESREFERENCES .................................................................................................................................................................................................................................................... 22222222 APPENDIX: INFORM MESAPPENDIX: INFORM MESAPPENDIX: INFORM MESAPPENDIX: INFORM MESSAGE ETHEREAL PCAPSAGE ETHEREAL PCAPSAGE ETHEREAL PCAPSAGE ETHEREAL PCAP .................................................................................................................................... 23232323
  • 3. Summary General Description The CPE WAN Management Protocol defines a mechanism that encompasses secure auto-configuration of a CPE, and also incorporates other CPE management functions into a common framework.
  • 4. Terminology In this seciont, it will list all abbreviations used in this document. B-NT : Broadband Network Termination CPE : Customer Primise Equipment A DSL B-NT is one of form of broadband CPE. This could be ADSL modem DSLAM : Digital Subscriber Line Access Multiplexer The DSLAM at the access provider is the equipment that really allows DSL to happen. A DSLAM takes connections from many customers and aggregates them onto a single, high-capacity connection to the Internet. It may provide additional functions including routing or dynamic IP address assignment for the customers. BRAS : Broadband Remote Access Server This is the connection point to the network(Internet, WAN) and application service providers(ISP, Coporate Network…etc) ACS : Auto-Configuration Server This is a component in the broadband network responsible for auto-configuration of the CPE for advanced services. IGD : Internet Gateway Device A CPE device that is either a B-NT or a broadband router. RPC : Remote Procedure Call Parameter A name-value pari representing a manageable CPE parameter made accessible to an ACS for reading and/or writing. Session A contiguous sequence of transactions(one request and one response) between a CPE and an ACS.
  • 5. Voucher A digitally signed data structure that instructs a particular CPE to enable or disable Options, and characteristics that determine under what conditions the Options persist. OUI : Organizationally Unique Identifier An OUI is a 24-bit globally unique assigned number referenced by various standards. For example, the OUI is used in the family of 802 LAN standards: Ethernet, Token Ring, etc. The OUI is usually concatenated with another 24 bits that are assigned by that Organization in order to make a 48-bit number that is unique to a particular piece of hardware, to make it possible to uniquely address that hardware. For example, the Ethernet MAC Address is such a 48-bit number, unique to one particular Ethernet interface. The OUI is usually concatenated with 24 or 40 bits to form an EUI-48 or an EUI-64. The other names for OUI is : MAC Address, Vendor Address, Vendor ID, NIC Address, Ethernet Address and others.
  • 6. Functional Components The CPE WAN Management Protocol is intended to support a variety of functionalities to manage a collection of CPEs lie in LAN through WAN. It provides the following main capability : Auto-Configuration and Dynamic Service Provisioning The protocol allows an ACS to provision a CPE or collection of CPE based on a variety of criteria. The provisioning mechanism includes specific provisioning parameters and a general mechanism for adding vendor-specific provisioning capabilities as needed. Software/Firmware Image Management The CPE WAN Management Protocol provides tools to manage downloading of CPE software/firmware image files. The protocol provides mechanisms for version identification, file download initiation (ACS initiated downloads and optional CPE initiated downloads), and notification of the ACS of the success or failure of a file download. Status and Performance Monitoring The protocol provides support for a CPE to make available information that the ACS may use to monitor the CPE’s status and performance statistics. The protocol defines a common set of such parameters, and provides a standard syntax for vendors to define additional non-standard Diagnostics The protocol provides support for a CPE to make available information that the ACS may use to diagnose connectivity or service issues. The protocol defines a common set of such parameters and a general mechanism for adding vendor-specific diagnostic capabilities.
  • 7. Positioning in the Auto-Configuration Architecture Fig.1 Architectural Goals The protocol is intended to provide flexible support for various business models for distributing and managing CPE, including: CPE provided and managed by the network provider. CPE purchased in retail with pre-registration to associate the specific CPE with a service provider and customer account (a mobile-phone like model) . CPE purchased in retail with post-installation user registration with a service provider. The protocol is intended to provide flexibility in the connectivity model. The protocol is intended to provide the following: Allow both CPE and ACS initiated connection establishment, avoiding the need for a persistent connection to be maintained between each CPE and an ACS. The functional interactions between the ACS and CPE should be independent of which end initiated the establishment of the connection. In particular, even where ACS initiated connectivity is not supported, all ACS initiated transactions should be able to take place over a connection initiated by the CPE. Allow one or more ACS servers to serve a population of CPE, which may be associated with one or more service providers. Optimize the use of connections that are established to minimize connection multiple bi-directional transactions to occur over a single connection. The protocol is intended to support discovery and association of ACS and CPE : TR-104 (old WT-104) (may haveDHCP) Internet, ISP network, Frame Relay… (TR-069) LAN WAN
  • 8. Provide mechanisms for a CPE to discover the appropriate ACS for a given service provider. Provide mechanisms to allow an ACS to securely identify a CPE (using OUI) and associate it with a user/customer. Processes to support such association should support models that incorporate user interaction as well as those that are fully automatic. The protocol model to allow an ACS access to control and monitor various parameters associated with a CPE. The mechanisms provided to access these parameters is designed with the following premises : Different CPE may have differing capability levels, implementing different subsets of optional functionality. As a result, an ACS must be able to discover the capabilities of a particular CPE. An ACS must be able to control and monitor the current configuration of a CPE. Other control entities besides an ACS may be able to control some parameters of a CPE’s configuration (e.g., via LAN-side auto-configuration). As a result, the protocol must allow an ACS to account for external changes to a CPE’s configuration. The ACS should also be able to control which configuration parameters can be controlled via means other than by the ACS. The protocol should allow vendor-specific parameters to be defined and accessed. Security The protocol is designed to provide a high degree of security. The security model is also designed to be scalable. It is intended to allow basic security to accommodate less robust CPE implementations, while allowing greater security for those that can support more advanced security mechanisms. Assumptions Some assumptions made in defining the CPE WAN Management Protocol are listed below : In the case of a B-NT, prior to use of the CPE WAN Management Protocol, a connection has been established to a WAN from which an ACS is accessible. All CPE regardless of type (bridge1, router, or other) obtain an IP address in order to communicate with an ACS. A CPE can interact with a single ACS at a time. At any time, a CPE is aware of exactly one ACS with which it can connect. An ACS can hand off a CPE to another ACS only by explicitly altering the ACS contact and authentication information.
  • 9. Use of Protocols Protocol Components CPE/ACS Management Application RPC Methods SOAP HTTP SSL/TLS TCP/IP Fig.2 Protocol Layer Description CPE/ACS Application The application uses the CPE WAN Management Protocol on the CPE and ACS, respectively. The application is locally defined and not specified as part of the CPE WAN Management Protocol RPC Methods The specific RPC methods that are defined by the CPE WAN Management Protocol (TR-69) SOAP A standard XML-based syntax used here to encode remote procedure calls. Specifically SOAP 1.1 [4] HTTP HTTP 1.1 [2] SSL/TLS The standard Internet transport layer security protocols. Specifically, either SSL 3.0 [4] (Secure Socket Layer), or TLS 1.0 [5] (Transport Layer Security). Use of SSL/TLS is RECOMMENDED but is not required TCP/IP Standard TCP/IP Fig.3
  • 10. ACS Discovery The CPE may be configured locally with the URL of the ACS. As part of the IP layer auto-configuration, a DHCP server on the access network may be configured to include the ACS URL as a DHCP option. The CPE may have a default ACS URL that it may use if no other URL is provided to it. The CPE would use DNS(DomainName Server) to resolve the IP address of the ACS from the host name component of the URL. Use of SSL/TLS and TCP The use of SSL/TLS to transport the CPE WAN Management Protocol is RECOMMENDED If SSL/TLS is supported, support for encryption algorithms with key lengths greater than or equal to 128 bits should be supported. A CPE must be able to initiate outgoing connections to the ACS. An ACS must be able to accept CPE-initiated connections. If SSL/TLS is used, the CPE must authenticate the ACS using the ACS-provided certificate. If SSL/TLS is used, the ACS MAY accept a validated CPE-provided certificate to authenticate the CPE, but the ACS MUST allow the SSL/TLS connection to be established if the CPE does not provide a certificate. Use of HTTP A SOAP request from an ACS to a CPE is sent over an HTTP response, while the CPE’s SOAP response to an ACS request is sent over a subsequent HTTP post. Each HTTP post or response may contain more than one SOAP envelope (within the negotiated limits). Each envelope may contain a SOAP request or response, independent from any other envelope. Authentication If the CPE is not authenticated using SSL/TLS, the ACS must authenticate the CPE using HTTP. If SSL/TLS is being used for encryption, the ACS may use either basic or digest authentication[3]. If SSL/TLS is not being used, then the ACS must use digest authentication. The ACS may issue the authentication once as part of the first HTTP transaction, and assume the authentication to hold for the duration of the TCP connection. If any form of HTTP authentication is used to authenticate the CPE, the CPE should use a username / userid that is globally unique among all CPE manufacturers. Specifically it should be a multi-part string comprising a manufacturer identifier and a serial number unique within that manufacturer.
  • 11. The recommended format for this string is: OUI-SERIAL where OUI is a six hexadecimal-digit value using all upper-case letters and including any leading zeros. The OUI value MUST be a valid OUI as defined in [5]. SERIAL is a string that uniquely identifies the CPE from the particular manufacturer. If the manufacturer has multiple CPE products with overlapping serial number ranges, the SERIAL string must include additional distinguishing characters to ensure that the entire string is unique. Example: “00D09E-0123456789” The password used in either form of HTTP authentication should be a unique value for each CPE. That is, multiple CPE should not share the same password. This password is a shared secret, and thus must be known by both CPE and ACS. Both CPE and ACS should take appropriate steps to prevent unauthorized access to the password, or list of passwords in the case of an ACS. Use of SOAP The CPE WAN Management Protocol defines SOAP 1.1 as the encoding syntax to transport the RPC method calls and responses. The encoding must use the standard SOAP 1.1 envelope and serialization namespaces : Envelope namespace identifier “http://schemas.xmlsoap.org/soap/envelope/” Serialization namespace identifier “http://schemas.xmlsoap.org/soap/encoding/” All elements and attributes defined as part of this version of the CPE WAN Management Protocol are associated with the following namespace identifier: “urn:dslforum-org:cwmp-1-0”
  • 12. TR-69 specified RPCs Fig.4 Method name CPE requirement Server requirement CPE methods Responding Calling GetRPCMethods Required Optional SetParameterValues Required Required GetParameterValues Required Required GetParameterNames Required Required SetParameterAttributes Required Optional GetParameterAttributes Required Optional AddObject Required Optional DeleteObject Required Optional Reboot Required Optional Download Required Required Upload Optional Optional FactoryReset Optional Optional GetQueuedTransfers Optional Optional ScheduleInform Optional Optional SetVouchers Optional Optional GetOptions Optional Optional Server methods Calling Responding GetRPCMethods Optional Required Inform Required Required TransferComplete Required Required RequestDownload Optional Optional Kicked Optional Optional
  • 13. Fault Handling Fig.5 lists the fault codes that can be returned by a CPE. Fig.6 lists the fault codes that can be returned by a server.
  • 14. Protocols’ Interoperability Hardware (Device / Network) Layer Operating System Layer Application Layer Flash Network (TCP/IP) socket (TLS/SSL) App-HW IF WAN HTTP ( Basic and Digest Access Athentication ) SOAP RPCs TR-69 Message Processor 1)Msg Processor State Controlling 2) RPCs recognizing & RPC services dispaching) RPC services Decoding RPC message Read / Write Configuration MD5 Digesting SSL Encrypting / Decrypting send / recv bytes Executing results Encoding RPC Response / Faults
  • 15. Transaction Session Since the CPE is driving the HTTP connection to the ACS, only the CPE is responsible for connection initiation and teardown. All transaction sessions must begin with an Inform message from the CPE contained in the initial HTTP post. CPE is responsible for terminating the transaction session, while the ACS could just consider the session terminated. This specification does not say that there should be a persistent connection between the CPE and the ACS. Fig.7 Having no content
  • 16. RPCs The following are the RPPs specified in the TR-069 specification. Method name CPE requireme nt Server requirement CPE methods Responding Calling GetRPCMethods Required Optional SetParameterValues Required Required GetParameterValues Required Required GetParameterNames Required Required SetParameterAttributes Required Optional GetParameterAttributes Required Optional AddObject Required Optional DeleteObject Required Optional Reboot Required Optional Download Required Required Upload Optional Optional FactoryReset Optional Optional GetQueuedTransfers Optional Optional ScheduleInform Optional Optional SetVouchers Optional Optional GetOptions Optional Optional Server methods Calling Responding GetRPCMethods Optional Required Inform Required Required TransferComplete Required Required RequestDownload Optional Optional Kicked Optional Optional
  • 17. Inform A CPE must call the Inform method to initiated a transaction sequence whenever a connection to an ACS is established. GetRPCMethods This method may be used by a CPE or Server to discover the set of methods supported by the Server or CPE it is in communication with. This list may include both standard methods (those defined in this specification or a subsequent version) and vendor-specific methods. The receiver of the response MUST ignore any unrecognized methods. GetParameterNames This method may be used by a Server to discover the Parameters accessible on a particular CPE. GetParameterValues This method may be used by a Server to obtain the value of one or more CPE Parameters. SetParameterValues This method may be used by a Server to modify the value of one or more CPE Parameters. On successful receipt of a SetParameterValues RPC, the CPE must apply the changes to each of the specified Parameters immediately and atomically. The order of Parameters listed in the ParameterList has no significance—the application of value changes to the CPE must be independent from the order in which they are listed. A successful response to this RPC should occur only after the new Parameter values have been successfully applied. If the CPE requires a reboot before applying the Parameter values, the CPE must reply before such a reboot, and thus before the Parameter values have been applied. In this case, the reply must come only after all validation of the request has been completed and the new values have been appropriately saved such that they will definitely be applied immediately following the reboot. GetParameterAttributes This method may be used by a Server to read the attributes associated with one or more CPE Parameter. SetParameterAttributes This method may be used by a Server to modify attributes associated with one or more CPE Parameter.
  • 18. AddObject This method may be used by the Server to create a new instance of a multi-instance object — a collection of Parameters and/or other objects for which multiple instances are defined. The method call takes as an argument the path name of the collection of objects for which a new instance is to be created. For example : Top.Group.Object This path name does not include an instance number for the object to be created. That instance number is assigned by the CPE and returned in the response. Once assigned the instance number of an object cannot be changed and persists until the object is deleted using the DeleteObject method. After creation, Parameters or sub-objects within the object are refereced by the path name appended with the instance number. For example, if the AddObject method returned an instance number of 2, a Parameter within this instance may then be referred to by the path: Top.Group.Object.2.Parameter On creation of an object using this method, the Parameters contained within the object are set to their default values and the associated attributes are set to the following : Notification is set to zero (notification off) AccessList includes all defined entities After doing this operation, it should save the modified configuration into the flash. DeleteObject This method is used to remove a particular instance of an object. This method call takes as an argument the path name of the object instance including the instance number. For example: Top.Group.Object.2. If this method call is successful, the specified instance of this object is subsequently unavailable for access and the CPE may discard the state previously associated with any Parameter or sub-object contained within this instance. When an object instance is deleted, the instance numbers associated with any other instances of the same collection of objects remain unchanged. Thus, the instance numbers of object instances in a collection might not be consecutive. After doing this operation, it should save the modified configuration into the flash. Download This method may be used by the Server to cause the CPE to download a specified file from the designated location.
  • 19. TransferComplete This method informs the server of the completion (either successful or unsuccessful) of a file transfer initiated by an earlier Download or Upload method call. This must be called only when the associated Download or Upload response indicated that the transfer had not yet completed at that time (indicated by a non-zero value of the Status argument in the response). In such cases, it may be called either later in the same session in which the transfer was initiated or in any subsequent session. When used, this method should be called only after the transfer has completed (or failed). The criteria used by a CPE to determine when a transfer is considered complete are specific to the implementation of the CPE. RequestDownload This method allows the CPE to request a file download from the Server. On reception of this request, the Server may call the Download method to initiate the download. FactoryReset This method resets the CPE to its factory default state. This method should be used with extreme caution. Reboot This method causes the CPE to reboot. The CPE MUST send the method response prior to rebooting. It should be used with extreme caution. This method is primarily intended for diagnostic purposes. This method is not intended for use by an ACS to initiate a reboot after setting CPE parameters or initiating a download. If a CPE requires a reboot in those cases, it is responsible for initiating that reboot on its own after the termination of the session. Because some CPE may not require a reboot under these circumstances, an ACS should not call this method in these cases, which would result in an unnecessary reboot.
  • 20. TR-069 Relevant TRs The followings are explanations for all TR-069 related TRs. TR-069 : CPE WAN Management Protocol Describes a bi-directional remote management protocol for CPE, intended for communication between CPE and management entity known as an Auto-Configuration Server (ACS). It is intended to support a variety of functionalities to manage CPE, including auto-configuration and dynamic service provisioning, software/firmware image management, status and performance monitoring and diagnostics. Amendment 1 includes interoperability-related clarifications and errata. Amendment 2 includes extensions to enable multi-cast and autonomous file downloads, especially important for many video environments. TR-098 : Internet Gateway Device Data Model Defines the Internet Gateway Device (IGD) data model for managing various types of broadband CPE, or gateways, using TR-069. Includes functionality such as managing NAT, DHCP, WAN and LAN interfaces. TR-104 : Provisioning Parameters for VoIP CPE Defines the data model required for managing a VoIP-capable device (including terminal adapters and VoIP endpoints) using TR-069. TR-106 : Data Model Template for TR-069-enabled Devices Includes both common management objects for TR-069 managed end devices and rules for combining modular functionalities described in various specifications (e.g., how to combine TR-104 and TR-098 object for an ATA embedded in a gateway).
  • 21. WT-107 : TR-098 Issue 2 Contains additional management objects and parameters for the gateway data model. TR-111 : Applying TR-069 to Remote Management of Home Networking Devices Defines extensions to the TR-069 protocol and TR-098 IGD and TR-106 data models to enhance the ability of an ACS to manage devices in customer premises. Describes both a mechanism to enable IGD and end device association and the ability for an ACS to initiate a management session on a device behind a NAT gateway. Note that the content originally specified in TR-111 has been incorporated into the Amendment 1 versions of TR-069, TR-106, and TR-098. PD-128Interoperability Test Plan for TR-069 Plugfests Interoperability test plan used at plugfests for TR-069-capable ACSes and CPE. Defines interoperability tests at for the underlying protocols on which TR-069 is built, the TR-069 methods, as well as real-world application tests. WT-131 : ACS Northbound Interface Requirements Requirements for an ACS northbound API to backend OSS/BSS, support and policy systems. TR-135 : Data Model for a TR-069-enabled STB Defines the data model required for managing a set-top box (STB) using TR-069, including satellite, cable, terrestrial and IPTV STBs—with or without PVR and other optional functionality. TR-140 : Data Model for TR-069-enabled Network Attached Storage Device Defines a TR-069 data model for provisioning and management of devices delivering content storage capabilities. Storage-enabled devices could include NAS, media servers, or PVR-related storage. WT-142 : Framework for TR-069-enabled PON Devices Outlines a general framework for applying TR-069 to Optical Network Terminals (ONTs) in a fiber network. WT-143 : Network Service Provider Initiated Throughput Performance Test Defines a data model to enable throughput testing for TR-069-enabled CPE. PD-154 : XML Data Model Definition Defines XML schema for data models. Provides the architecture of expression of data model specifications in XML as well as a CPE's overall management capabilities in XML. PD-157TR-069 Data Model Common Objects Contains additional common management objects and parameters for end devices. PD-158 : TR-069 Data Model for Email and Browser Services Defines a data model to enable management of device email and browser services.
  • 22. References 1. DSL Forum, http://www.dslforum.org 2. RFC 2616, Hypertext Transfer Protocol—HTTP/1.1, http://www.ietf.org/rfc/rfc2616.txt 3. RFC 2617, HTTP Authentication: Basic and Digest Access Authentication, http://www.ietf.org/rfc/rfc2617.txt 4. Simple Object Access Protocol (SOAP) 1.1, http://www.w3.org/TR/2000/NOTE-SOAP-20000508 5. Orginationally Unique Identifiers (OUIs), http://standards.ieee.org/faqs/OUI.html 6. The SSL Protocol, Version 3.0, http://www.netscape.com/eng/ssl3/draft302.txt 7. RFC 2246, The TLS Protocol, Version 1.0, http://www.ietf.org/rfc/rfc2246.txt 8. RFC 2132, DHCP Options and BOOTP Vendor Extensions, http://www.ietf.org/rfc/rfc2132.txt 9. Technical Report 037(TR-037) : Auto-Configuration for the Conncetion Between the DSL Broadband Network termination(B-NT) and the Network using ATM, DSL Forum, March 2001. 10. Technical Report 069(TR-069) : CPE WAN Management Protocol, Jeff Bernstein, Tim Spets, May 2004.
  • 23. 23 Appendix: Inform message Ethereal PCAP Captured on 2005-12-26
  • 24. 24
  • 25. 25
  • 26. 26