It then edits the TFTP IP address, and potentially the config file name. The CMTS checks the static MIC if configured and then strips it off. This DHCP offer comes down, and is intercepted at the CMTS. The modem does its normal DHCP Discover, and the server sends a DHCP offer. Others are even more similar than maternal twins and can appear exactly the same down to the most minute detail.įigure 1: This demonstration is using cable dynamic-secret reject nocrypt and ip tftp source-interface Loopback0 commands. Some are only the same on the surface, and the façade is barely skin deep. These instances have to be handled with care, because legitimate moving happens from time to time as nodes are split and customers are recombined/shifted to new CMTSs.Ĭlones also vary in their depth, tactics and evil genius complexity. They can, however, exist on different CMTSs, and thus appear to the provisioning software as if the modem moved. ![]() ![]() The headaches that result from two devices sharing the same ARP remain the stuff of legend in networking circles.įor that same ARP war reason, DOCSIS clones can’t exist on the same CMTS. When two devices have the same MAC address, they ultimately look like the same device.Ī similar problem exists in Ethernet networking with ARP (address resolution protocol). Cloning, as you might expect, starts by having two devices violate that rule by having the same MAC address.
0 Comments
Leave a Reply. |