Cisco Cisco IOS Software Release 12.2(2)XA
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
6
Hardware Supported
OL-1645-01 Rev CO
System Requirements
voice and other real-time traffic. The first CoS is used for data (and voice if no other CoS is defined),
and up to three additional classes of service can be defined to give higher priority for voice and other
real-time traffic.
and up to three additional classes of service can be defined to give higher priority for voice and other
real-time traffic.
IPSec Encryption Support
To use IPSec encryption, the Cisco uBR905 and Cisco uBR925 cable access routers and the destination
endpoint must support IPSec encryption and be configured for the same encryption policy. The endpoint
is typically an IPSec gateway such as a peer router, Cisco PIX Firewall, or other device that can be
configured for IPSec. (The CMTS does not need to support IPSec encryption unless it is desired that the
CMTS act as an IPSec gateway.)
endpoint must support IPSec encryption and be configured for the same encryption policy. The endpoint
is typically an IPSec gateway such as a peer router, Cisco PIX Firewall, or other device that can be
configured for IPSec. (The CMTS does not need to support IPSec encryption unless it is desired that the
CMTS act as an IPSec gateway.)
Note
The IPSec feature set encrypts traffic sent between endpoints, such as between two Cisco uBR905
cable access routers, to protect traffic sent across the Internet and other unprotected networks. The
DOCSIS BPI feature encrypts traffic on the cable interface between the cable access router and the
CMTS. To use BPI encryption, the cable access router and the CMTS must support and enable BPI
encryption.
cable access routers, to protect traffic sent across the Internet and other unprotected networks. The
DOCSIS BPI feature encrypts traffic on the cable interface between the cable access router and the
CMTS. To use BPI encryption, the cable access router and the CMTS must support and enable BPI
encryption.
Hardware Supported
The Cisco uBR905 cable access router contains the following interfaces:
•
A single F-connector interface to the cable system.
•
Four RJ-45 (10BASE-T Ethernet) hub ports to connect:
–
Up to three computers directly to the four Ethernet hub ports at the rear of the Cisco uBR905
router when operating in bridging mode. When operating in routing mode, all four Ethernet hub
ports can be connected directly to four computers.
router when operating in bridging mode. When operating in routing mode, all four Ethernet hub
ports can be connected directly to four computers.
–
One of the four Ethernet hub ports at the rear of the Cisco uBR905 router can be connected to
an Ethernet hub, which then connects additional computers or devices at the site when operating
in routing or bridging mode.
an Ethernet hub, which then connects additional computers or devices at the site when operating
in routing or bridging mode.
•
One RJ-45 console port (optional) to connect to a laptop computer or console terminal when locally
configuring the Cisco uBR905 router; the router ships from the Cisco factory with the console port
enabled.
configuring the Cisco uBR905 router; the router ships from the Cisco factory with the console port
enabled.
•
The onboard hardware accelerator for IPSec encryption is automatically used by default to encrypt
and decrypt all traffic protected by either 56-bit or 168-bit IPSec encryption.
and decrypt all traffic protected by either 56-bit or 168-bit IPSec encryption.
The Cisco uBR925 cable access router contains the following interfaces:
•
A single F-connector interface to the cable system.
•
Four RJ-45 (10BASE-T Ethernet) hub ports to connect:
–
Up to three computers directly to the four Ethernet hub ports at the rear of the cable access
router when operating in bridging mode. When operating in routing mode, all four Ethernet hub
ports can be connected directly to four computers.
router when operating in bridging mode. When operating in routing mode, all four Ethernet hub
ports can be connected directly to four computers.
–
One of the four Ethernet hub ports at the rear of the cable access router can be connected to an
Ethernet hub, which then connects additional computers or devices at the site when operating
in routing or bridging mode.
Ethernet hub, which then connects additional computers or devices at the site when operating
in routing or bridging mode.
•
One USB port to connect the cable access router to a computer.